CVE-2025-3654
- EPSS 0.05%
- Veröffentlicht 03.01.2026 23:33:04
- Zuletzt bearbeitet 03.02.2026 17:36:31
Petlibro Smart Pet Feeder Platform versions up to 1.7.31 contains an information disclosure vulnerability that allows unauthorized access to device hardware information by exploiting insecure API endpoints. Attackers can retrieve device serial number...
CVE-2025-3660
- EPSS 0.04%
- Veröffentlicht 03.01.2026 23:33:04
- Zuletzt bearbeitet 03.02.2026 17:32:07
Petlibro Smart Pet Feeder Platform versions up to 1.7.31 contains a broken access control vulnerability that allows authenticated users to access other users' pet data by exploiting missing ownership verification. Attackers can send requests to /memb...
CVE-2025-3652
- EPSS 0.05%
- Veröffentlicht 03.01.2026 23:33:03
- Zuletzt bearbeitet 03.02.2026 17:40:56
Petlibro Smart Pet Feeder Platform versions up to 1.7.31 contains an information disclosure vulnerability that allows unauthorized access to private audio recordings by exploiting sequential audio IDs and insecure assignment endpoints. Attackers can ...
CVE-2025-3653
- EPSS 0.06%
- Veröffentlicht 03.01.2026 23:33:03
- Zuletzt bearbeitet 03.02.2026 17:38:41
Petlibro Smart Pet Feeder Platform versions up to 1.7.31 contains an improper access control vulnerability that allows unauthorized device manipulation by accepting arbitrary serial numbers without ownership verification. Attackers can control any de...
CVE-2025-15115
- EPSS 0.19%
- Veröffentlicht 03.01.2026 23:33:02
- Zuletzt bearbeitet 03.02.2026 17:46:43
Petlibro Smart Pet Feeder Platform versions up to 1.7.31 contains an authentication bypass vulnerability that allows unauthenticated attackers to access any user account by exploiting OAuth token validation flaws in the social login system. Attackers...
CVE-2025-3646
- EPSS 0.05%
- Veröffentlicht 03.01.2026 23:33:02
- Zuletzt bearbeitet 03.02.2026 17:42:15
Petlibro Smart Pet Feeder Platform versions up to 1.7.31 contains an authorization bypass vulnerability that allows unauthorized users to add users as shared owners to any device by exploiting missing permission checks. Attackers can send requests to...