Security researchers have discovered CVE-2025-3653, a critical improper access control vulnerability in the cloud platform supporting Petlibro smart pet feeders. The flaw allows any remote attacker to gain complete control over any device connected to the platform by simply knowing its serial number. No authentication or authorization is required. This allows an attacker to manipulate feeding schedules, potentially harming a pet, and access live camera feeds, creating a serious invasion of privacy. The vulnerability, present in platform versions up to 1.7.31, is a textbook example of insecure API design in the consumer IoT Security space, where basic security principles like object-level authorization are often overlooked.
CVE-2025-3653The vulnerability, discovered by researchers at VulnCheck, is a Broken Object Level Authorization (BOLA) flaw, which is the #1 risk on the OWASP API Security Top 10. The Petlibro API endpoints that control device functions accept a device serial number as a parameter but fail to check if the user making the request is the actual owner of that device. An attacker can therefore write a simple script to iterate through possible serial numbers and send commands (e.g., 'dispense food', 'change schedule', 'access camera stream') to any valid device they find.
VulnCheck has developed a proof-of-concept demonstrating the flaw. While there is no evidence of widespread malicious exploitation yet, the simplicity of the attack makes it highly likely that it will be abused now that it is public. Attackers could engage in anything from harmless pranks (overfeeding pets) to malicious stalking and privacy invasion (accessing cameras).
Detection is difficult for the end-user. The vendor (Petlibro) is in the best position to detect this at the API level.
| Type | Value | Description | Context | Confidence |
|---|---|---|---|---|
| api_endpoint | High volume of requests from a single IP with many different serial numbers | This is the primary indicator of an attacker trying to enumerate valid devices. | Petlibro's API gateway logs | high |
| log_source | Device logs showing commands executed by an unknown user/session | If the device logs the source of a command, this would be a clear indicator. | Device-level logs (unlikely to be user-accessible) | low |
| other | Unexplained changes to feeding schedule or manual feeding events | A user might notice their pet being fed at odd times or the food history showing unexpected entries. | User observation, companion app history | high |
This is a server-side vulnerability, so there is no action the user can take to directly fix it. The responsibility lies entirely with Petlibro to patch their backend API.
The vendor must implement proper server-side authorization checks to validate that a user is authorized to control the requested device.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats