🔐 CVE Alert

CVE-2025-34254

UNKNOWN 0.0

D-Link Nuclias Connect <= v1.3.1.4 Login Account Enumeration

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

D-Link Nuclias Connect firmware versions <= 1.3.1.4 contain an observable response discrepancy vulnerability. The application's 'Login' endpoint returns distinct JSON responses depending on whether the supplied username is associated with an existing account. Because the responses differ in the `error.message`string value, an unauthenticated remote attacker can enumerate valid usernames/accounts on the server. NOTE: D-Link states that a fix is under development.

CWE CWE-204
Vendor d-link
Product nuclias connect
Published Oct 16, 2025
Last Updated Mar 23, 2026
Stay Ahead of the Next One

Get instant alerts for d-link nuclias connect

Be the first to know when new unknown vulnerabilities affecting d-link nuclias connect are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

D-Link / Nuclias Connect
* < 1.3.1.4

References

NVD ↗ CVE.org ↗ EPSS Data ↗
vulncheck.com: https://www.vulncheck.com/advisories/dlink-nuclias-connect-login-account-enumeration dlink.com: https://www.dlink.com/en/for-business/nuclias/nuclias-connect supportannouncement.us.dlink.com: https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10472

Credits

Alex Williams from Pellera Technologies