Screen SFT DAB 600/C firmware 1.9.3 contains an authentication bypass vulnerability that allows attackers to change the admin password without requiring the current credentials. Attackers can exploit the userManager.cgx API endpoint by sending a crafted POST request with a new MD5-hashed password to directly modify the admin account's authentication.
References
| Link | Resource |
|---|---|
| https://www.dbbroadcast.com | Product |
| https://www.dbbroadcast.com/products/radio/sft-dab-series-compact-air/ | Product |
| https://www.exploit-db.com/exploits/51458 | Exploit |
| https://www.vulncheck.com/advisories/screen-sft-dab-c-firmware-authentication-bypass-admin-password-change | Third Party Advisory |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5774.php | Exploit Third Party Advisory |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5774.php | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-12-22 22:16
Updated : 2025-12-26 16:50
NVD link : CVE-2023-53967
Mitre link : CVE-2023-53967
CVE.ORG link : CVE-2023-53967
JSON object : View
Products Affected
dbbroadcast
- sft_dab_600\/c_firmware
- sft_dab_600\/c
CWE
CWE-306
Missing Authentication for Critical Function
