D-Link D-View 8 versions 2.0.1.107 and below contain an improper access control vulnerability in backend API endpoints. Any authenticated user can supply an arbitrary user_id value to retrieve sensitive credential data belonging to other users, including super administrators. The exposed credential material can be reused directly as a valid authentication secret, allowing full impersonation of the targeted account. This results in complete account takeover and full administrative control over the D-View system.
History

Wed, 21 Jan 2026 18:15:00 +0000

Type Values Removed Values Added
Description D-Link D-View 8 versions 2.0.1.107 and below contain an improper access control vulnerability in backend API endpoints. Any authenticated user can supply an arbitrary user_id value to retrieve sensitive credential data belonging to other users, including super administrators. The exposed credential material can be reused directly as a valid authentication secret, allowing full impersonation of the targeted account. This results in complete account takeover and full administrative control over the D-View system.
Title D-Link D-View 8 IDOR Allows Credential Disclosure and Account Takeover
Weaknesses CWE-639
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-01-21T18:02:45.878Z

Reserved: 2026-01-15T18:42:20.938Z

Link: CVE-2026-23754

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-01-21T18:16:25.370

Modified: 2026-01-21T18:16:25.370

Link: CVE-2026-23754

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.