Home

Description

D-Link D-View 8 versions 2.0.1.107 and below contain an improper access control vulnerability in backend API endpoints. Any authenticated user can supply an arbitrary user_id value to retrieve sensitive credential data belonging to other users, including super administrators. The exposed credential material can be reused directly as a valid authentication secret, allowing full impersonation of the targeted account. This results in complete account takeover and full administrative control over the D-View system.

PUBLISHED Reserved 2026-01-15 | Published 2026-01-21 | Updated 2026-01-26 | Assigner VulnCheck




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-639 Authorization Bypass Through User-Controlled Key

Product status

Default status
unaffected

Any version
affected

Credits

Kazuma Matsumoto, a security researcher at GMO Cybersecurity by IERAE, Inc. finder

References

supportannouncement.us.dlink.com/...ation.aspx?name=SAP10471 vendor-advisory patch

www.vulncheck.com/...dential-disclosure-and-account-takeover third-party-advisory

cve.org (CVE-2026-23754)

nvd.nist.gov (CVE-2026-23754)

Download JSON