Screen SFT DAB 600/C firmware 1.9.3 contains a session management vulnerability that allows attackers to bypass authentication controls by exploiting IP address session binding. Attackers can reuse the same IP address and issue unauthorized requests to the userManager API to change user passwords without proper authentication.
References
| Link | Resource |
|---|---|
| https://www.dbbroadcast.com | Product |
| https://www.dbbroadcast.com/products/radio/sft-dab-series-compact-air/ | Product |
| https://www.exploit-db.com/exploits/51456 | Exploit |
| https://www.vulncheck.com/advisories/screen-sft-dab-c-firmware-authentication-bypass-password-change | Third Party Advisory |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5772.php | Exploit Third Party Advisory |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5772.php | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-12-22 22:16
Updated : 2025-12-26 16:50
NVD link : CVE-2023-53969
Mitre link : CVE-2023-53969
CVE.ORG link : CVE-2023-53969
JSON object : View
Products Affected
dbbroadcast
- sft_dab_600\/c_firmware
- sft_dab_600\/c
CWE
CWE-306
Missing Authentication for Critical Function
