D View 8

2 CVEs product

Monthly

CVE-2026-23755 HIGH PATCH This Week

D-Link D-View 8 installer versions 2.0.1.107 and below are vulnerable to DLL preloading attacks that execute with administrator privileges when a user approves a UAC prompt. An attacker can place a malicious version.dll file in the installer directory to achieve arbitrary code execution with system-level access. This vulnerability affects users installing or updating D-View 8 on Windows systems.

D-Link D View 8
NVD
CVSS 3.1
7.3
EPSS
0.0%
CVE-2026-23754 HIGH PATCH This Week

D-Link D-View 8 versions 2.0.1.107 and below allow authenticated users to bypass access controls on backend API endpoints and retrieve credential data for arbitrary accounts, including administrators. An attacker can leverage exposed credentials to directly authenticate as any user and gain full administrative control over the D-View system. A patch is available to address this high-severity improper access control vulnerability.

D-Link D View 8
NVD
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-23755
EPSS 0% CVSS 7.3
HIGH PATCH This Week

D-Link D-View 8 installer versions 2.0.1.107 and below are vulnerable to DLL preloading attacks that execute with administrator privileges when a user approves a UAC prompt. An attacker can place a malicious version.dll file in the installer directory to achieve arbitrary code execution with system-level access. This vulnerability affects users installing or updating D-View 8 on Windows systems.

D-Link D View 8
NVD
CVE-2026-23754
EPSS 0% CVSS 8.8
HIGH PATCH This Week

D-Link D-View 8 versions 2.0.1.107 and below allow authenticated users to bypass access controls on backend API endpoints and retrieve credential data for arbitrary accounts, including administrators. An attacker can leverage exposed credentials to directly authenticate as any user and gain full administrative control over the D-View system. A patch is available to address this high-severity improper access control vulnerability.

D-Link D View 8
NVD

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy