Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23754: CWE-639 Authorization Bypass Through User-Controlled Key in D-Link D-View 8

0
High
VulnerabilityCVE-2026-23754cvecve-2026-23754cwe-639
Published: Wed Jan 21 2026 (01/21/2026, 18:02:45 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: D-View 8

Description

D-Link D-View 8 versions 2.0.1.107 and below contain an improper access control vulnerability in backend API endpoints. Any authenticated user can supply an arbitrary user_id value to retrieve sensitive credential data belonging to other users, including super administrators. The exposed credential material can be reused directly as a valid authentication secret, allowing full impersonation of the targeted account. This results in complete account takeover and full administrative control over the D-View system.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/05/2026, 09:15:46 UTC

Technical Analysis

CVE-2026-23754 affects D-Link D-View 8, a network management system widely used for monitoring and managing network devices. The vulnerability arises from improper access control in backend API endpoints, where the user_id parameter is user-controllable and not properly validated. Authenticated users can supply arbitrary user_id values to retrieve sensitive credential data belonging to other users, including those with super administrator privileges. This credential data includes authentication secrets that can be directly reused to impersonate the targeted accounts without additional authentication steps. Consequently, an attacker with any valid user credentials can escalate privileges to full administrative control over the D-View system. The vulnerability does not require user interaction and can be exploited remotely over the network, increasing its risk profile. The CVSS 4.0 base score is 8.7 (high), reflecting the ease of exploitation and the critical impact on confidentiality, integrity, and availability. The root cause is classified under CWE-639 (Authorization Bypass Through User-Controlled Key). As of the publication date, no patches or fixes have been released, and no known exploits have been observed in the wild. This vulnerability threatens the security of network management infrastructure, potentially allowing attackers to manipulate network devices and configurations via the compromised D-View system.

Potential Impact

The impact of CVE-2026-23754 is severe for organizations relying on D-Link D-View 8 for network management. Successful exploitation leads to complete account takeover of any user, including super administrators, granting attackers full control over the management system. This enables unauthorized access to sensitive network device configurations, monitoring data, and administrative functions. Attackers could modify network settings, disrupt operations, or create persistent backdoors, severely compromising network integrity and availability. The confidentiality of credential data is directly breached, enabling lateral movement within the network. Organizations could face operational downtime, data breaches, and regulatory compliance violations. Given the critical role of network management systems, this vulnerability poses a significant risk to enterprise, government, and service provider networks worldwide.

Mitigation Recommendations

1. Immediately restrict access to D-View 8 management interfaces to trusted networks and users only, using network segmentation and firewall rules. 2. Enforce strong authentication mechanisms and monitor for unusual account activity to detect potential exploitation attempts. 3. Implement strict API access controls and validate user_id parameters server-side to prevent unauthorized data access. 4. Regularly audit user permissions and remove unnecessary accounts or privileges. 5. If possible, disable or limit API functionality that exposes sensitive credential data until a patch is available. 6. Monitor vendor communications for security updates or patches and apply them promptly once released. 7. Employ intrusion detection systems to identify anomalous API requests indicative of exploitation attempts. 8. Consider deploying multi-factor authentication for all users to reduce risk of credential misuse. 9. Conduct regular security assessments of the D-View environment to identify and remediate weaknesses. 10. Prepare incident response plans specifically addressing potential compromise of network management systems.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-01-15T18:42:20.938Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697119084623b1157ce32428

Added to database: 1/21/2026, 6:20:56 PM

Last enriched: 3/5/2026, 9:15:46 AM

Last updated: 3/24/2026, 7:57:35 AM

Views: 73

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses