Home

Description

Screen SFT DAB 1.9.3 contains an authentication bypass vulnerability that allows attackers to exploit weak session management by reusing IP-bound session identifiers. Attackers can issue unauthorized requests to the device management API by leveraging the session binding mechanism to perform critical operations on the transmitter.

PUBLISHED Reserved 2025-12-08 | Published 2025-12-10 | Updated 2025-12-11 | Assigner VulnCheck




HIGH: 8.7CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-384: Session Fixation

Product status

Default status
unaffected

1.9.3
affected

Credits

LiquidWorm as Gjoko Krstic of Zero Science Lab finder

References

www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5775.php exploit

www.exploit-db.com/exploits/51459 (ExploitDB-51459) exploit

www.screen.it (Product Homepage) product

www.dbbroadcast.com (Vendor Homepage) product

www.dbbroadcast.com/...cts/radio/sft-dab-series-compact-air/ (Product Homepage) product

www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5775.php (Vendor Advisory URL) vendor-advisory

www.vulncheck.com/...-bypass-via-session-management-weakness (VulnCheck Advisory: Screen SFT DAB 1.9.3 Authentication Bypass via Session Management Weakness) third-party-advisory

cve.org (CVE-2023-53776)

nvd.nist.gov (CVE-2023-53776)

Download JSON