Screen SFT DAB 600/C firmware versions up to and including 1.9.3 contain an improper access control on the user management API allows unauthenticated requests to retrieve structured user data, including account names and connection metadata such as client IP and timeout values.
References
| Link | Resource |
|---|---|
| https://packetstormsecurity.com/files/172332/ | Third Party Advisory |
| https://www.dbbroadcast.com/products/radio/sft-dab-series-compact-air/ | Product |
| https://www.exploit-db.com/exploits/51460 | Exploit |
| https://www.vulncheck.com/advisories/screen-sft-dab-600c-unauthenticated-information-disclosure | Third Party Advisory |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5776.php | Exploit Third Party Advisory |
| https://www.exploit-db.com/exploits/51460 | Exploit |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5776.php | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-11-14 23:15
Updated : 2025-12-26 16:45
NVD link : CVE-2023-7328
Mitre link : CVE-2023-7328
CVE.ORG link : CVE-2023-7328
JSON object : View
Products Affected
dbbroadcast
- sft_dab_600\/c_firmware
- sft_dab_600\/c
CWE
CWE-306
Missing Authentication for Critical Function
