D-Link Nuclias Connect firmware versions <= 1.3.1.4 contain an observable response discrepancy vulnerability. The application's 'Login' endpoint returns distinct JSON responses depending on whether the supplied username is associated with an existing account. Because the responses differ in the `error.message`string value, an unauthenticated remote attacker can enumerate valid usernames/accounts on the server. NOTE: D-Link states that a fix is under development.
Metrics
Affected Vendors & Products
References
History
Mon, 20 Oct 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
D-link
D-link nuclias Connect |
|
| Vendors & Products |
D-link
D-link nuclias Connect |
Fri, 17 Oct 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 16 Oct 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | D-Link Nuclias Connect firmware versions <= 1.3.1.4 contain an observable response discrepancy vulnerability. The application's 'Login' endpoint returns distinct JSON responses depending on whether the supplied username is associated with an existing account. Because the responses differ in the `error.message`string value, an unauthenticated remote attacker can enumerate valid usernames/accounts on the server. NOTE: D-Link states that a fix is under development. | |
| Title | D-Link Nuclias Connect <= v1.3.1.4 Login Account Enumeration | |
| Weaknesses | CWE-204 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-10-16T18:52:08.435Z
Updated: 2025-10-17T14:29:49.920Z
Reserved: 2025-04-15T19:15:22.578Z
Link: CVE-2025-34254
Updated: 2025-10-17T14:29:47.517Z
Status : Awaiting Analysis
Published: 2025-10-16T19:15:32.777
Modified: 2025-10-21T19:31:50.020
Link: CVE-2025-34254
No data.