D-Link D-View Use of Hard-coded Cryptographic Key Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of D-Link D-View. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the TokenUtils class. The issue results from a hard-coded cryptographic key. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-21991.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.zerodayinitiative.com/advisories/ZDI-24-447/ |
![]() ![]() ![]() |
History
Wed, 06 Aug 2025 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Dlink
Dlink d-view 8 |
|
CPEs | cpe:2.3:a:dlink:d-view_8:2.0.1.28:*:*:*:*:*:*:* | |
Vendors & Products |
Dlink
Dlink d-view 8 |

Status: PUBLISHED
Assigner: zdi
Published: 2024-05-23T21:29:58.566Z
Updated: 2024-08-01T21:11:11.620Z
Reserved: 2024-05-23T21:28:51.883Z
Link: CVE-2024-5296

Updated: 2024-08-01T21:11:11.620Z

Status : Analyzed
Published: 2024-05-23T22:15:15.617
Modified: 2025-08-06T14:25:33.860
Link: CVE-2024-5296

No data.