D-Link Nuclias Connect firmware versions <= 1.3.1.4 contain a stored cross-site scripting (XSS) vulnerability due to improper sanitization of the 'Network' field when editing the configuration, creating a profile, and adding a network. An authenticated attacker can inject arbitrary JavaScript to be executed in the context of other users viewing the profile entry. NOTE: D-Link states that a fix is under development.
References
| Link | Resource |
|---|---|
| https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10472 | Vendor Advisory |
| https://www.dlink.com/en/for-business/nuclias/nuclias-connect | Product |
| https://www.vulncheck.com/advisories/dlink-nuclias-connect-stored-xss | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-10-16 19:15
Updated : 2025-10-30 16:11
NVD link : CVE-2025-34253
Mitre link : CVE-2025-34253
CVE.ORG link : CVE-2025-34253
JSON object : View
Products Affected
dlink
- nuclias_connect
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
