Screen SFT DAB 1.9.3 contains a weak session management vulnerability that allows attackers to bypass authentication controls by reusing IP address-bound session identifiers. Attackers can exploit the vulnerable API by intercepting and reusing established sessions to remove user accounts without proper authorization.
References
| Link | Resource |
|---|---|
| https://www.dbbroadcast.com | Product |
| https://www.dbbroadcast.com/products/radio/sft-dab-series-compact-air/ | Product |
| https://www.exploit-db.com/exploits/51457 | Exploit Third Party Advisory |
| https://www.screen.it | Product |
| https://www.vulncheck.com/advisories/screen-sft-dab-authentication-bypass-via-ip-session-management | Third Party Advisory |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5773.php | Third Party Advisory |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5773.php | Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
Configuration 4 (hide)
| AND |
|
Configuration 5 (hide)
| AND |
|
History
No history.
Information
Published : 2025-12-10 21:16
Updated : 2025-12-18 21:15
NVD link : CVE-2023-53741
Mitre link : CVE-2023-53741
CVE.ORG link : CVE-2023-53741
JSON object : View
Products Affected
dbbroadcast
- sft_dab_300\/c_firmware
- sft_dab_015\/c
- sft_dab_050\/c
- sft_dab_600\/c_firmware
- sft_dab_150\/c
- sft_dab_015\/c_firmware
- sft_dab_050\/c_firmware
- sft_dab_150\/c_firmware
- sft_dab_300\/c
- sft_dab_600\/c
CWE
CWE-384
Session Fixation
