First published: Wed Oct 04 2023(Updated: )
This vulnerability allows remote attackers to escalate privileges on affected installations of D-Link D-View. Authentication is required to exploit this vulnerability. The specific flaw exists within the showUsers method. The issue results from the lack of proper authorization before accessing a privileged endpoint. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the user.
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link D-View |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-19535 is considered high due to its potential for privilege escalation.
To fix ZDI-CAN-19535, D-Link recommends updating to the latest version of D-View that addresses this vulnerability.
ZDI-CAN-19535 affects installations of D-Link D-View that do not have the necessary security updates applied.
Yes, ZDI-CAN-19535 can be exploited remotely, but authentication is required to initiate the attack.
ZDI-CAN-19535 involves a lack of proper authorization within the showUsers method of D-Link D-View, allowing for privilege escalation.