Количество 3
Количество 3
CVE-2025-34255
D-Link Nuclias Connect firmware versions <= 1.3.1.4 contain an observable response discrepancy vulnerability. The application's 'Forgot Password' endpoint returns distinct JSON responses depending on whether the supplied email address is associated with an existing account. Because the responses differ in the `data.exist` boolean value, an unauthenticated remote attacker can enumerate valid email addresses/accounts on the server. NOTE: D-Link states that a fix is under development.
GHSA-fff6-x26h-q5rp
D-Link Nuclias Connect firmware versions <= 1.3.1.4 contain an observable response discrepancy vulnerability. The application's 'Forgot Password' endpoint returns distinct JSON responses depending on whether the supplied email address is associated with an existing account. Because the responses differ in the `data.exist` boolean value, an unauthenticated remote attacker can enumerate valid email addresses/accounts on the server. NOTE: D-Link states that a fix is under development.
BDU:2025-13178
Уязвимость программного обеспечения для централизованного управления беспроводными сетями D-Link Nuclias Connect, связанная с несоответствием ответов на входящие запросы, позволяющая нарушителю раскрыть защищаемую информацию
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-34255 D-Link Nuclias Connect firmware versions <= 1.3.1.4 contain an observable response discrepancy vulnerability. The application's 'Forgot Password' endpoint returns distinct JSON responses depending on whether the supplied email address is associated with an existing account. Because the responses differ in the `data.exist` boolean value, an unauthenticated remote attacker can enumerate valid email addresses/accounts on the server. NOTE: D-Link states that a fix is under development. | CVSS3: 5.3 | 0% Низкий | 4 месяца назад | |
GHSA-fff6-x26h-q5rp D-Link Nuclias Connect firmware versions <= 1.3.1.4 contain an observable response discrepancy vulnerability. The application's 'Forgot Password' endpoint returns distinct JSON responses depending on whether the supplied email address is associated with an existing account. Because the responses differ in the `data.exist` boolean value, an unauthenticated remote attacker can enumerate valid email addresses/accounts on the server. NOTE: D-Link states that a fix is under development. | CVSS3: 5.3 | 0% Низкий | 4 месяца назад | |
BDU:2025-13178 Уязвимость программного обеспечения для централизованного управления беспроводными сетями D-Link Nuclias Connect, связанная с несоответствием ответов на входящие запросы, позволяющая нарушителю раскрыть защищаемую информацию | CVSS3: 5.3 | 0% Низкий | 4 месяца назад |
Уязвимостей на страницу