Home

Description

D-Link Nuclias Connect firmware versions <= 1.3.1.4 contain an observable response discrepancy vulnerability. The application's 'Login' endpoint returns distinct JSON responses depending on whether the supplied username is associated with an existing account. Because the responses differ in the `error.message`string value, an unauthenticated remote attacker can enumerate valid usernames/accounts on the server. NOTE: D-Link states that a fix is under development.

PUBLISHED Reserved 2025-04-15 | Published 2025-10-16 | Updated 2025-10-17 | Assigner VulnCheck




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-204 Observable Response Discrepancy

Product status

Default status
unaffected

* before 1.3.1.4
affected

Credits

Alex Williams from Pellera Technologies finder

References

www.vulncheck.com/...clias-connect-login-account-enumeration third-party-advisory

www.dlink.com/en/for-business/nuclias/nuclias-connect product

supportannouncement.us.dlink.com/...ation.aspx?name=SAP10472 vendor-advisory

cve.org (CVE-2025-34254)

nvd.nist.gov (CVE-2025-34254)

Download JSON