Impact
The vulnerability in D-Link D-View 8 allows an attacker to supply a malicious "version.dll" file in the same folder as the installer. When a user runs the installer and accepts the UAC prompt, the program loads the DLL from its execution directory. Because the search path is uncontrolled, the attacker’s DLL is loaded, allowing the attacker’s code to execute with the same privileges granted by the UAC elevation. This results in full system compromise, including data theft, persistence, or further lateral movement.
Affected Systems
All D-Link D-View 8 installations running version 2.0.1.107 or older are affected. D-Link recommends upgrading to version 2.0.5.109 Beta or later to eliminate the flaw.
Risk and Exploitability
The CVSS score of 8.4 indicates a high severity finding. The EPSS score of less than 1% suggests that the likelihood of exploitation in the wild is currently low, and the vulnerability is not listed in the CISA KEV catalog. However, because it involves elevation of privilege through ordinary user interaction, any user with local access who runs the installer can be taken over. The likely attack vector is local, relying on the installer’s execution by a victim who accepts a UAC prompt; this is inferred from the need to supply a malicious version.dll next to the installer. While exploitation requires the attacker to obtain or trick the user into running a malicious installer file, the impact of successful exploitation is critical.
OpenCVE Enrichment