Home

Description

Screen SFT DAB 1.9.3 contains a weak session management vulnerability that allows attackers to bypass authentication controls by reusing IP address-bound session identifiers. Attackers can exploit the vulnerable API by intercepting and reusing established sessions to remove user accounts without proper authorization.

PUBLISHED Reserved 2025-12-07 | Published 2025-12-10 | Updated 2025-12-11 | Assigner VulnCheck




HIGH: 7.1CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N

Problem types

CWE-384: Session Fixation

Product status

Default status
unaffected

1.9.3
affected

Credits

LiquidWorm as Gjoko Krstic of Zero Science Lab finder

References

www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5773.php exploit

www.exploit-db.com/exploits/51457 (ExploitDB-51457) exploit

www.screen.it (Product Homepage) product

www.dbbroadcast.com/...cts/radio/sft-dab-series-compact-air/ (Official Product Homepage) product

www.dbbroadcast.com (Vendor Homepage) vendor-advisory vdb-entry

www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5773.php (Vendor Security Advisory for ZSL-2023-5773) vendor-advisory vdb-entry

www.vulncheck.com/...cation-bypass-via-ip-session-management (VulnCheck Advisory: Screen SFT DAB 1.9.3 Authentication Bypass via IP Session Management) third-party-advisory

cve.org (CVE-2023-53741)

nvd.nist.gov (CVE-2023-53741)

Download JSON