Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34255: CWE-204 Observable Response Discrepancy in D-Link Nuclias Connect

0
Medium
VulnerabilityCVE-2025-34255cvecve-2025-34255cwe-204
Published: Thu Oct 16 2025 (10/16/2025, 18:52:59 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: Nuclias Connect

Description

D-Link Nuclias Connect firmware versions <= 1.3.1.4 contain an observable response discrepancy vulnerability. The application's 'Forgot Password' endpoint returns distinct JSON responses depending on whether the supplied email address is associated with an existing account. Because the responses differ in the `data.exist` boolean value, an unauthenticated remote attacker can enumerate valid email addresses/accounts on the server. NOTE: D-Link states that a fix is under development.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 00:29:51 UTC

Technical Analysis

The vulnerability identified as CVE-2025-34255 affects D-Link Nuclias Connect firmware versions up to 1.3.1.4. It is classified under CWE-204, which involves observable response discrepancies that can be exploited for information disclosure. Specifically, the 'Forgot Password' API endpoint returns a JSON response containing a 'data.exist' boolean field that differs based on whether the provided email address corresponds to a valid account. This difference in response allows an unauthenticated remote attacker to enumerate valid email addresses registered on the system without any authentication or user interaction. The vulnerability arises due to improper handling of error messages and response content that inadvertently leaks user existence information. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low complexity, no privileges or user interaction required, and limited impact confined to confidentiality (user enumeration). D-Link has confirmed the issue and is working on a patch, but no fixes are currently available. No known exploits have been reported in the wild, but the flaw can be leveraged as a reconnaissance step in targeted attacks against organizations using Nuclias Connect devices.

Potential Impact

This vulnerability primarily impacts the confidentiality of user information by enabling attackers to enumerate valid email addresses/accounts on affected Nuclias Connect devices. Such information disclosure can facilitate targeted phishing campaigns, social engineering, credential stuffing, or brute force attacks against valid accounts. While the vulnerability does not directly allow unauthorized access or system compromise, it lowers the barrier for attackers to identify legitimate users, increasing the risk of subsequent attacks. Organizations relying on Nuclias Connect for network management or access control may face increased exposure of user data, potentially leading to privacy violations and reputational damage. The scope is limited to devices running vulnerable firmware versions, but given the widespread use of D-Link networking products globally, the impact could be significant in sectors such as education, SMBs, and enterprises that deploy Nuclias Connect solutions.

Mitigation Recommendations

Organizations should immediately monitor D-Link communications for the release of the official patch and apply it promptly once available. In the interim, administrators can implement the following mitigations: 1) Restrict access to the Nuclias Connect management interface and its API endpoints to trusted internal networks or VPNs to reduce exposure to unauthenticated remote attackers. 2) Employ web application firewalls (WAFs) or intrusion detection/prevention systems (IDS/IPS) to detect and block suspicious enumeration patterns targeting the 'Forgot Password' endpoint. 3) Review and harden password reset workflows to minimize information leakage, potentially by standardizing responses regardless of email validity. 4) Educate users and administrators about phishing risks that may arise from leaked account information. 5) Monitor logs for unusual activity related to password reset requests to detect enumeration attempts early. These steps help reduce the attack surface until a vendor patch is deployed.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.578Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68f140779f8a5dbaeaf6e5bb

Added to database: 10/16/2025, 6:59:03 PM

Last enriched: 3/24/2026, 12:29:51 AM

Last updated: 5/10/2026, 5:44:56 AM

Views: 193

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses