CVE-2025-3653

Petlibro · Petlibro Multiple Products

A high-severity vulnerability has been identified in the Petlibro Smart Pet Feeder Platform, affecting multiple products.

Executive summary

A high-severity vulnerability has been identified in the Petlibro Smart Pet Feeder Platform, affecting multiple products. Successful exploitation could allow a remote attacker to gain unauthorized control over smart pet feeders, potentially altering feeding schedules, accessing sensitive user data, or causing operational disruption. Due to the high-risk nature of this vulnerability, immediate remediation is strongly recommended to prevent potential harm to pets and protect user privacy.

Vulnerability

The vulnerability exists due to an improper access control mechanism on the platform's central API. An unauthenticated remote attacker can craft a specific API request to bypass standard authorization checks. By manipulating device identifiers within the API call, the attacker can execute commands on behalf of legitimate users, such as modifying feeding schedules, dispensing food on demand, or retrieving device and user account information without valid credentials.

Business impact

This vulnerability is rated as High severity with a CVSS score of 7.3. Exploitation could lead to significant business impacts, including operational disruption and reputational damage. An attacker's ability to maliciously alter feeding schedules could directly harm pets, leading to customer complaints, brand damage, and potential legal liability. Furthermore, the exposure of user data could result in a privacy breach, eroding customer trust and potentially incurring regulatory fines. Compromised devices could also be used as a pivot point for launching further attacks against the user's local network.

Remediation

Immediate Action: Organizations and individual users must apply the security updates provided by Petlibro immediately to patch the affected platform components. After patching, it is critical to review device access logs for any unauthorized configuration changes or anomalous activity that may have occurred prior to the update.

Proactive Monitoring: Implement enhanced monitoring of network traffic to and from the smart feeders. Specifically, look for:

  • Anomalous API requests from unknown or suspicious IP addresses.
  • Unexpected changes to feeding configurations or device settings that do not correlate with legitimate user actions.
  • Unusual outbound traffic patterns from the feeders to destinations other than known Petlibro cloud services.

Compensating Controls: If immediate patching is not feasible, implement the following controls to reduce the risk of exploitation:

  • Network Segmentation: Isolate the Petlibro devices on a separate network segment (VLAN) with strict firewall rules to prevent them from accessing other critical systems on the network.
  • Egress Filtering: Restrict outbound internet access for the feeders, allowing connections only to the specific IP addresses and domains required for the Petlibro service to function.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high severity (CVSS 7.3) of this vulnerability and its potential for direct, tangible impact, we strongly recommend that all users of affected Petlibro products prioritize the immediate application of the vendor-supplied security update. Although there is no evidence of active exploitation at this time, the risk of reputational damage and potential harm is significant. Organizations should treat this as a critical priority and implement compensating controls, such as network segmentation, if patching is delayed for any reason.