Home

Description

D-Link Nuclias Connect firmware versions <= 1.3.1.4 contain an observable response discrepancy vulnerability. The application's 'Forgot Password' endpoint returns distinct JSON responses depending on whether the supplied email address is associated with an existing account. Because the responses differ in the `data.exist` boolean value, an unauthenticated remote attacker can enumerate valid email addresses/accounts on the server. NOTE: D-Link states that a fix is under development.

PUBLISHED Reserved 2025-04-15 | Published 2025-10-16 | Updated 2025-10-17 | Assigner VulnCheck




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-204 Observable Response Discrepancy

Product status

Default status
unaffected

* before 1.3.1.4
affected

Credits

Alex Williams from Pellera Technologies finder

References

www.vulncheck.com/...ect-forgot-password-account-enumeration third-party-advisory

www.dlink.com/en/for-business/nuclias/nuclias-connect product

supportannouncement.us.dlink.com/...ation.aspx?name=SAP10472 vendor-advisory

cve.org (CVE-2025-34255)

nvd.nist.gov (CVE-2025-34255)

Download JSON