{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-34254","assignerOrgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","state":"PUBLISHED","assignerShortName":"VulnCheck","dateReserved":"2025-04-15T19:15:22.578Z","datePublished":"2025-10-16T18:52:08.435Z","dateUpdated":"2026-05-15T11:15:40.713Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","modules":["web interface"],"product":"Nuclias Connect","vendor":"D-Link","versions":[{"lessThan":"1.3.1.4","status":"affected","version":"0","versionType":"custom"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:dlink:nuclias_connect:*:*:*:*:*:*:*:*","versionEndExcluding":"1.3.1.4","versionStartIncluding":"0","vulnerable":true}],"negate":false,"operator":"OR"}],"operator":"OR"}],"credits":[{"lang":"en","type":"finder","value":"Alex Williams from Pellera Technologies"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"D-Link Nuclias Connect firmware versions &lt;= 1.3.1.4 contain an observable response discrepancy vulnerability.&nbsp;The application's 'Login' endpoint returns distinct JSON responses depending on whether the supplied username is associated with an existing account. Because the responses differ in the `error.message`string value, an unauthenticated remote attacker can enumerate valid usernames/accounts on the server.&nbsp;NOTE: D-Link states that a fix is under development.<br>"}],"value":"D-Link Nuclias Connect firmware versions <= 1.3.1.4 contain an observable response discrepancy vulnerability. The application's 'Login' endpoint returns distinct JSON responses depending on whether the supplied username is associated with an existing account. Because the responses differ in the `error.message`string value, an unauthenticated remote attacker can enumerate valid usernames/accounts on the server. NOTE: D-Link states that a fix is under development."}],"impacts":[{"capecId":"CAPEC-575","descriptions":[{"lang":"en","value":"CAPEC-575 Account Footprinting"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":6.9,"baseSeverity":"MEDIUM","exploitMaturity":"NOT_DEFINED","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"NONE","vulnConfidentialityImpact":"LOW","vulnIntegrityImpact":"NONE","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-204","description":"CWE-204 Observable Response Discrepancy","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","shortName":"VulnCheck","dateUpdated":"2026-05-15T11:15:40.713Z"},"references":[{"tags":["third-party-advisory"],"url":"https://www.vulncheck.com/advisories/dlink-nuclias-connect-login-account-enumeration"},{"tags":["product"],"url":"https://www.dlink.com/en/for-business/nuclias/nuclias-connect"},{"tags":["vendor-advisory"],"url":"https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10472"}],"source":{"discovery":"UNKNOWN"},"title":"D-Link Nuclias Connect <= v1.3.1.4 Login Account Enumeration","x_generator":{"engine":"vulncheck"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-10-17T14:29:43.264857Z","id":"CVE-2025-34254","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-17T14:29:49.920Z"}}]}}