CVE-2024-5296
D-Link D-View Use of Hard-coded Cryptographic Key Authentication Bypass Vulnerability
CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
0th
D-Link D-View Use of Hard-coded Cryptographic Key Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of D-Link D-View. Authentication is not required to exploit this vulnerability. The specific flaw exists within the TokenUtils class. The issue results from a hard-coded cryptographic key. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-21991.
| CWE | CWE-321 |
| Vendor | d-link |
| Product | d-view |
| Published | May 23, 2024 |
| Last Updated | Aug 1, 2024 |
Stay Ahead of the Next One
Get instant alerts for d-link d-view
Be the first to know when new critical vulnerabilities affecting d-link d-view are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Versions
D-Link / D-View
2.0.1.28