CVE-2026-23754

D-Link D-View 8 versions 2.0.1.107 and below contain an improper access control vulnerability in backend API endpoints. Any authenticated user can supply an arbitrary user_id value to retrieve sensitive credential data belonging to other users, including super administrators. The exposed credential material can be reused directly as a valid authentication secret, allowing full impersonation of the targeted account. This results in complete account takeover and full administrative control over the D-View system.
Configurations

Configuration 1 (hide)

cpe:2.3:a:dlink:d-view_8:*:*:*:*:*:*:*:*

History

30 Jan 2026, 21:30

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
References () https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10471 - () https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10471 - Vendor Advisory, Patch
References () https://www.vulncheck.com/advisories/dlink-dview-8-idor-allows-credential-disclosure-and-account-takeover - () https://www.vulncheck.com/advisories/dlink-dview-8-idor-allows-credential-disclosure-and-account-takeover - Third Party Advisory
First Time Dlink
Dlink d-view 8
CPE cpe:2.3:a:dlink:d-view_8:*:*:*:*:*:*:*:*

21 Jan 2026, 18:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-21 18:16

Updated : 2026-01-30 21:30


NVD link : CVE-2026-23754

Mitre link : CVE-2026-23754

CVE.ORG link : CVE-2026-23754


JSON object : View

Products Affected

dlink

  • d-view_8
CWE
CWE-639

Authorization Bypass Through User-Controlled Key