Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34255: CWE-204 Observable Response Discrepancy in D-Link Nuclias Connect

0
Medium
VulnerabilityCVE-2025-34255cvecve-2025-34255cwe-204
Published: Thu Oct 16 2025 (10/16/2025, 18:52:59 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: Nuclias Connect

Description

D-Link Nuclias Connect firmware versions <= 1.3.1.4 contain an observable response discrepancy vulnerability. The application's 'Forgot Password' endpoint returns distinct JSON responses depending on whether the supplied email address is associated with an existing account. Because the responses differ in the `data.exist` boolean value, an unauthenticated remote attacker can enumerate valid email addresses/accounts on the server. NOTE: D-Link states that a fix is under development.

AI-Powered Analysis

AILast updated: 10/16/2025, 19:14:39 UTC

Technical Analysis

CVE-2025-34255 affects D-Link Nuclias Connect firmware versions 1.3.1.4 and earlier. The vulnerability arises from an observable response discrepancy in the 'Forgot Password' API endpoint. When an unauthenticated attacker submits an email address, the server responds with a JSON object containing a boolean field `data.exist` that indicates whether the email is associated with a valid account. This difference in response allows attackers to enumerate valid email addresses on the system remotely without authentication or user interaction. The vulnerability is classified under CWE-204 (Observable Response Discrepancy), which involves information leakage through differing application responses. The CVSS v4.0 base score is 6.9 (medium severity), reflecting the network attack vector, no required privileges or user interaction, and low impact on confidentiality (limited to account enumeration). No known exploits have been reported in the wild, and D-Link has stated that a patch is under development. This vulnerability primarily risks user privacy and could be leveraged to facilitate further attacks such as targeted phishing, credential stuffing, or brute force attempts against valid accounts.

Potential Impact

For European organizations deploying D-Link Nuclias Connect, this vulnerability exposes user account information by allowing attackers to confirm valid email addresses. This can lead to increased risk of targeted phishing campaigns, social engineering, and brute force attacks against network management accounts. While it does not directly compromise system integrity or availability, the leakage of account existence information undermines confidentiality and can be a stepping stone for more severe attacks. Organizations with large user bases or sensitive network infrastructure managed via Nuclias Connect are at higher risk. Additionally, privacy regulations such as GDPR impose strict requirements on protecting personal data, including email addresses; thus, exploitation of this vulnerability could lead to compliance issues and reputational damage. The absence of authentication requirements and ease of remote exploitation increase the likelihood of reconnaissance activity by malicious actors.

Mitigation Recommendations

Organizations should implement the following specific mitigations: 1) Monitor network traffic to detect unusual or repeated requests to the 'Forgot Password' endpoint indicative of enumeration attempts. 2) Implement rate limiting and IP throttling on password reset endpoints to reduce automated probing. 3) Temporarily disable or restrict access to the 'Forgot Password' functionality if feasible until a patch is available. 4) Educate users and administrators about phishing risks and encourage strong, unique passwords combined with multi-factor authentication (MFA) where supported. 5) Regularly check for firmware updates from D-Link and apply patches promptly once released. 6) Consider network segmentation and access controls to limit exposure of Nuclias Connect management interfaces to trusted networks only. 7) Review and audit account creation and password reset logs for suspicious activity. These targeted actions go beyond generic advice by focusing on detection, access control, and user awareness specific to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.578Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68f140779f8a5dbaeaf6e5bb

Added to database: 10/16/2025, 6:59:03 PM

Last enriched: 10/16/2025, 7:14:39 PM

Last updated: 10/17/2025, 8:56:04 PM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats