D-Link D-View Authentication Bypass Vulnerability
CVE-2024-5296
What is CVE-2024-5296?
The D-Link D-View software contains a significant vulnerability that allows remote attackers to bypass authentication protocols. This flaw is due to a hard-coded cryptographic key used in the TokenUtils class, which can be exploited without any authentication requirements. As a result, attackers can gain unauthorized access to the system, posing a serious security risk to affected installations.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
D-View 2.0.1.28
News Articles
CVE-2024-5296 : D-LINK D-VIEW 2.0.1.28 TOKENUTILS HARD-CODED KEY - Cloud WAF
CVE-2024-5296 - D-Link D-View Use of Hard-coded Cryptographic Key Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of D-Link D-View.
References
CVSS V3.0
Timeline
- ๐ฐ
First article discovered by prophaze.com
Vulnerability published