• Home Support Forums Security Advisories Shop     English | French
Security Announcement
Announcement > SAP10472
Nuclias Connect v1.3.1.2 and below: Reported Multiple Vulnerabilities
Publication ID: SAP10472
Resolved Status: Partial
Published on: 13 October 2025 11:41 GMT
Last updated on: 13 October 2025 11:41 GMT

 

Overview

 

On May 15, 2025, third-party security researcher reported a vulnerability in the D-Link Nuclias Connect 1.3.0.2 Network Device Management platform. This specific issue has been addressed by downloading the last version.

 

Since this time there has been additional security exploits raised and patches for these are currently under development. 

 

D-Link takes the issues of network security and user privacy very seriously. We have a dedicated task force and product management team on call to address evolving security issues and implement appropriate security measures.

  

Report Information  

 

         - Report #1 - May 28, 2025 - CVE-2025-34248 - Link - Fix provided below in v1.3.1.4

 

         - Author: Alex Williams from Converge Technology Solutions -                                           alex _dot_ williams _at_ convergetp _dot_ com 

 

                          - D-Link Nuclias Connect firmware versions <= 1.3.1.3 contain a directory traversal vulnerability within /api/web/dnc/global/database/deleteBackup due to improper sanitization of the deleteBackupList parameter. This can allow an authenticated attacker to delete arbitrary files impacting the integrity and availability of the system.       

 

       - Report #2 - TBD 10/15/2025 - Fix Under Development 

 

 

         - Author: Alex Williams from Converge Technology Solutions -                                           alex _dot_ williams _at_ convergetp _dot_ com 


                          - D-Link Nuclias Connect firmware versions < 1.3.1.4 contain a stored cross-site scripting (XSS) vulnerability due to improper sanitization of the 'Network' field when editing the configuration, creating a profile, and adding a network. An authenticated attacker can inject arbitrary JavaScript to be executed in the context of other users viewing the profile entry.

 

 

       - Report #3 - TBD 10/15/2025 - Fix Under Development -

 

 

         - Author: Alex Williams from Converge Technology Solutions -                                           alex _dot_ williams _at_ convergetp _dot_ com 


                          - D-Link Nuclias Connect firmware versions < 1.3.1.4 contain an observable response discrepancy vulnerability. The application's 'Login' endpoint returns distinct JSON responses depending on whether the supplied username is associated with an existing account. Because the responses differ in the `data.exist` boolean value, an unauthenticated remote attacker can enumerate valid usernames/accounts on the server.

 

 

       - Report #4 - TBD 10/15/2025 - Fix Under Development

 

 

         - Author: Alex Williams from Converge Technology Solutions -                                           alex _dot_ williams _at_ convergetp _dot_ com 


                          - D-Link Nuclias Connect firmware versions < 1.3.1.4 contain an observable response discrepancy vulnerability. The application's 'Forgot Password' endpoint returns distinct JSON responses depending on whether the supplied email address is associated with an existing account. Because the responses differ in the `data.exist` boolean value, an unauthenticated remote attacker can enumerate valid email addresses/accounts on the server.

 

Affected Models

 

Model

Software Version

 Region

Fixed Release

Recommendation

 Last Updated

Nuclias Connect

v1.3.1.2 and below

Worldwide

v1.3.1.4 Beta

You must update via the application, or

contact you regional technical support for license verification

Link:https://www.dlink.com/en/for-business/nuclias

10/13/2025

 

 

Regarding the Security Update for Your D-Link Device

 

Installing firmware updates is a critical step in addressing security vulnerabilities in your D-Link devices. D-Link strongly urges all users to install the relevant updates and regularly check for further updates. After downloading the firmware update, it is essential to ALWAYS validate its success by comparing the firmware version on your product interface to the firmware update version.

 

Please note that beta software, beta firmware, or a hot-fix release is still undergoing rigorous testing before its official release. This ensures that the software is of the highest quality and meets our stringent standards. However, it is essential to understand that the user assumes all risk and liability for its use. D-Link does not provide any express or implied warranties regarding the suitability or usability of the beta software, beta firmware, or hot-fix release. D-Link will not be liable for any direct, indirect, special, or consequential loss suffered by any party due to their use of the beta firmware, beta software, or hit-fix release.

 

NOTE: Our products have different hardware revisions, so please check your device’s hardware revision before downloading the corresponding firmware update. The hardware revision can be found on the product label next to the serial number or on the device's web interface.