D-Link Nuclias Connect firmware versions <= 1.3.1.4 contain an observable response discrepancy vulnerability. The application's 'Login' endpoint returns distinct JSON responses depending on whether the supplied username is associated with an existing account. Because the responses differ in the `error.message`string value, an unauthenticated remote attacker can enumerate valid usernames/accounts on the server. NOTE: D-Link states that a fix is under development.
History

Fri, 17 Oct 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 16 Oct 2025 19:00:00 +0000

Type Values Removed Values Added
Description D-Link Nuclias Connect firmware versions <= 1.3.1.4 contain an observable response discrepancy vulnerability. The application's 'Login' endpoint returns distinct JSON responses depending on whether the supplied username is associated with an existing account. Because the responses differ in the `error.message`string value, an unauthenticated remote attacker can enumerate valid usernames/accounts on the server. NOTE: D-Link states that a fix is under development.
Title D-Link Nuclias Connect <= v1.3.1.4 Login Account Enumeration
Weaknesses CWE-204
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-10-17T14:29:49.920Z

Reserved: 2025-04-15T19:15:22.578Z

Link: CVE-2025-34254

cve-icon Vulnrichment

Updated: 2025-10-17T14:29:47.517Z

cve-icon NVD

Status : Received

Published: 2025-10-16T19:15:32.777

Modified: 2025-10-16T19:15:32.777

Link: CVE-2025-34254

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.