CVE-2025-34253
📋 TL;DR
D-Link Nuclias Connect firmware versions up to 1.3.1.4 contain a stored XSS vulnerability in the 'Network' field during configuration editing, profile creation, and network addition. An authenticated attacker can inject malicious JavaScript that executes when other users view the affected profile entries. This affects organizations using vulnerable Nuclias Connect deployments.
💻 Affected Systems
- D-Link Nuclias Connect
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
An authenticated malicious insider or compromised account could inject JavaScript to steal admin credentials, perform session hijacking, redirect users to malicious sites, or modify device configurations.
Likely Case
Authenticated attackers with basic access could deface interfaces, steal session cookies, or perform limited privilege escalation within the Nuclias Connect management interface.
If Mitigated
With proper access controls and network segmentation, impact is limited to the management interface with no direct access to underlying systems.
🎯 Exploit Status
Requires authenticated access to the management interface. Attack complexity is medium due to the need for authentication and specific field targeting.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not yet released
Vendor Advisory: https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10472
Restart Required: No
Instructions:
Monitor D-Link security advisories for patch release. When available, download firmware update from D-Link support portal and apply through Nuclias Connect management interface.
🔧 Temporary Workarounds
Input Validation Enhancement
allImplement additional input validation and output encoding for the Network field in custom configurations if possible.
Content Security Policy
allImplement strict Content Security Policy headers to limit script execution.
🧯 If You Can't Patch
- Restrict access to Nuclias Connect management interface to trusted users only using network segmentation and firewall rules.
- Implement strong authentication controls and monitor for unusual configuration changes in the Network field.
🔍 How to Verify
Check if Vulnerable:
Check firmware version in Nuclias Connect management interface under System Information. If version is 1.3.1.4 or lower, system is vulnerable.
Check Version:
Login to Nuclias Connect web interface and navigate to System > Information to view firmware version.
Verify Fix Applied:
After applying patch, verify firmware version is higher than 1.3.1.4. Test Network field input with basic XSS payloads to confirm sanitization.
📡 Detection & Monitoring
Log Indicators:
- Unusual configuration changes to Network field
- Multiple failed login attempts followed by successful login and configuration changes
- JavaScript payloads in configuration logs
Network Indicators:
- Unusual traffic patterns to/from Nuclias Connect management interface
- External JavaScript loading from suspicious domains
SIEM Query:
source="nuclias_logs" AND (event="configuration_change" AND field="Network" AND value CONTAINS "<script>") OR (event="authentication" AND result="success" AND user NOT IN ["admin_users"])