{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T21:29:15.144","vulnerabilities":[{"cve":{"id":"CVE-2023-32168","sourceIdentifier":"zdi-disclosures@trendmicro.com","published":"2024-05-03T02:15:22.060","lastModified":"2025-08-07T15:49:16.027","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"D-Link D-View showUser Improper Authorization Privilege Escalation Vulnerability. This vulnerability allows remote attackers to escalate privileges on affected installations of D-Link D-View. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the showUser method. The issue results from the lack of proper authorization before accessing a privileged endpoint. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the user.\n. Was ZDI-CAN-19534."},{"lang":"es","value":"D-Link D-View muestra la vulnerabilidad de escalada de privilegios de autorización incorrecta del usuario. Esta vulnerabilidad permite a atacantes remotos escalar privilegios en las instalaciones afectadas de D-Link D-View. Se requiere autenticación para aprovechar esta vulnerabilidad. La falla específica existe dentro del método showUser. El problema se debe a la falta de autorización adecuada antes de acceder a un endpoint privilegiado. Un atacante puede aprovechar esta vulnerabilidad para escalar privilegios a recursos normalmente protegidos del usuario. Era ZDI-CAN-19534."}],"metrics":{"cvssMetricV30":[{"source":"zdi-disclosures@trendmicro.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"zdi-disclosures@trendmicro.com","type":"Secondary","description":[{"lang":"en","value":"CWE-285"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:dlink:d-view_8:*:*:*:*:*:*:*:*","versionEndIncluding":"2.0.1.27","matchCriteriaId":"3A0691FA-5D7B-47D3-BB1A-537804F92D18"}]}]}],"references":[{"url":"https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10332","source":"zdi-disclosures@trendmicro.com","tags":["Vendor Advisory"]},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-23-719/","source":"zdi-disclosures@trendmicro.com","tags":["Third Party Advisory"]},{"url":"https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10332","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-23-719/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}