D-Link D-View 8 versions 2.0.1.107 and below contain an improper access control vulnerability in backend API endpoints. Any authenticated user can supply an arbitrary user_id value to retrieve sensitive credential data belonging to other users, including super administrators. The exposed credential material can be reused directly as a valid authentication secret, allowing full impersonation of the targeted account. This results in complete account takeover and full administrative control over the D-View system.
References
| Link | Resource |
|---|---|
| https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10471 | Vendor Advisory Patch |
| https://www.vulncheck.com/advisories/dlink-dview-8-idor-allows-credential-disclosure-and-account-takeover | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-01-21 18:16
Updated : 2026-01-30 21:30
NVD link : CVE-2026-23754
Mitre link : CVE-2026-23754
CVE.ORG link : CVE-2026-23754
JSON object : View
Products Affected
dlink
- d-view_8
CWE
CWE-639
Authorization Bypass Through User-Controlled Key
