D-Link Nuclias Connect firmware versions <= 1.3.1.4 contain an observable response discrepancy vulnerability. The application's 'Forgot Password' endpoint returns distinct JSON responses depending on whether the supplied email address is associated with an existing account. Because the responses differ in the `data.exist` boolean value, an unauthenticated remote attacker can enumerate valid email addresses/accounts on the server. NOTE: D-Link states that a fix is under development.
History

Mon, 20 Oct 2025 13:30:00 +0000

Type Values Removed Values Added
First Time appeared D-link
D-link nuclias Connect
Vendors & Products D-link
D-link nuclias Connect

Fri, 17 Oct 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 16 Oct 2025 19:00:00 +0000

Type Values Removed Values Added
Description D-Link Nuclias Connect firmware versions <= 1.3.1.4 contain an observable response discrepancy vulnerability. The application's 'Forgot Password' endpoint returns distinct JSON responses depending on whether the supplied email address is associated with an existing account. Because the responses differ in the `data.exist` boolean value, an unauthenticated remote attacker can enumerate valid email addresses/accounts on the server. NOTE: D-Link states that a fix is under development.
Title D-Link Nuclias Connect <= v1.3.1.4 Forgot Password Account Enumeration
Weaknesses CWE-204
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-10-16T18:52:59.964Z

Updated: 2025-10-17T14:29:17.095Z

Reserved: 2025-04-15T19:15:22.578Z

Link: CVE-2025-34255

cve-icon Vulnrichment

Updated: 2025-10-17T14:29:14.522Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-10-16T19:15:32.920

Modified: 2025-10-21T19:31:50.020

Link: CVE-2025-34255

cve-icon Redhat

No data.