Critical Severity Vulnerability
This vulnerability has been rated as Critical severity. Immediate action is recommended.
CVE-2023-53968
CriticalVulnerability Description
Screen SFT DAB 600/C Firmware 1.9.3 contains a session management vulnerability that allows attackers to bypass authentication controls by exploiting IP address session binding. Attackers can reuse the same IP address and issue unauthorized requests to the userManager API to remove user accounts without proper authentication.
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Known Affected Software
1 configuration(s) from 1 vendor(s)
cpe:2.3:o:dbbroadcast:sft_dab_600\/c_firmware:1.9.3:*:*:*:*:*:*:*
References & Resources
-
https://www.dbbroadcast.comdisclosure@vulncheck.com Product
-
https://www.dbbroadcast.com/products/radio/sft-dab-series-compact-air/disclosure@vulncheck.com Product
-
https://www.exploit-db.com/exploits/51457disclosure@vulncheck.com Exploit
-
https://www.vulncheck.com/advisories/screen-sft-dab-c-firmware-authentication-bypass-erase-accountdisclosure@vulncheck.com Third Party Advisory Exploit
-
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5773.phpdisclosure@vulncheck.com Exploit Third Party Advisory
-
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5773.php134c704f-9b21-4f2e-91b3-4a467353bcc0 Exploit Third Party Advisory
Severity Details
Key Information
- Published Date
- December 22, 2025
