CVE-2026-23754

8.8 HIGH

📋 TL;DR

This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in D-Link D-View 8 network management software. Any authenticated user can access sensitive credential data of other users, including administrators, leading to complete account takeover and full system control. All D-View 8 installations running version 2.0.1.107 or below are affected.

💻 Affected Systems

Products:
  • D-Link D-View 8
Versions: 2.0.1.107 and below
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires any authenticated user account; no special configuration needed to be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete administrative takeover of the D-View system, allowing attacker to modify configurations, deploy malware, access all managed network devices, and potentially pivot to other systems.

🟠

Likely Case

Privilege escalation from regular user to administrator, credential theft of all users, and unauthorized access to sensitive network management data.

🟢

If Mitigated

Limited to authenticated users only, but still allows horizontal and vertical privilege escalation within the application.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is trivial once authenticated; public technical details available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.0.1.108 or later

Vendor Advisory: https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10471

Restart Required: Yes

Instructions:

1. Download D-View 8 version 2.0.1.108 or later from D-Link support site. 2. Backup current configuration. 3. Install the update following vendor instructions. 4. Restart the D-View service.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate D-View system from untrusted networks and limit access to authorized users only.

Access Control Restrictions

all

Implement strict network access controls and limit user accounts to only necessary personnel.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate D-View from untrusted networks
  • Remove all non-essential user accounts and implement strong authentication controls

🔍 How to Verify

Check if Vulnerable:

Check D-View version in administration interface; if version is 2.0.1.107 or below, system is vulnerable.

Check Version:

Check via D-View web interface: System > About or equivalent menu

Verify Fix Applied:

Verify version is 2.0.1.108 or higher in administration interface and test API endpoints for IDOR behavior.

📡 Detection & Monitoring

Log Indicators:

  • Unusual API calls to user credential endpoints
  • Multiple failed login attempts followed by successful login from different user
  • User privilege escalation events

Network Indicators:

  • Unusual API requests containing user_id parameters
  • Traffic patterns showing credential access from non-admin users

SIEM Query:

source="d-view" AND (uri="*/api/user/*" OR uri="*/api/credential/*") AND user!="admin" AND response_code=200

🔗 References

📤 Share & Export