| Title | Tomofun Furbo 360, Furbo Mini Furbo 360 (≤ FB0035_FW_036), Furbo Mini (≤ MC0020_FW_074) Insecure Storage of Sensitive Information |
|---|
| Description | An attacker who obtains a previously owned device, such as one which has been returned to Amazon or another seller, may connect to the device over UART and retrieve the SSID and Wi-Fi password of the previous owner. Factory resets do not remove the contents of the /mnt/flash/config.json file used for Wi-Fi authentication. Using a website like Wigle.net they may be able to geo-locate the previous owner and travel to their home address where they could connect to their network. |
|---|
| Source | ⚠️ https://github.com/dead1nfluence/Furbo-Advisories/blob/main/Insecure%20Storage%20of%20Sensitve%20Information%20-%20CVE-2025-XXXX.md |
|---|
| User | jTag Labs (UID 51246) |
|---|
| Submission | 09/24/2025 16:13 (7 months ago) |
|---|
| Moderation | 10/11/2025 20:33 (17 days later) |
|---|
| Status | Duplicate |
|---|
| VulDB entry | 328055 [Tomofun Furbo 360/Furbo Mini UART Interface sensitive information] |
|---|
| Points | 0 |
|---|