Description
Screen SFT DAB 600/C firmware 1.9.3 contains an authentication bypass vulnerability that allows attackers to change the admin password without requiring the current credentials. Attackers can exploit the userManager.cgx API endpoint by sending a crafted POST request with a new MD5-hashed password to directly modify the admin account's authentication.
Problem types
Missing Authentication for Critical Function
Product status
Credits
LiquidWorm as Gjoko Krstic of Zero Science Lab
References
www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5774.php
www.exploit-db.com/exploits/51458 (ExploitDB-51458)
www.dbbroadcast.com (DB Elettronica Telecomunicazioni SpA Homepage)
www.dbbroadcast.com/...cts/radio/sft-dab-series-compact-air/ (SFT DAB Series Product Page)
www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5774.php (Zero Science Lab Disclosure (ZSL-2022-5774))
www.vulncheck.com/...entication-bypass-admin-password-change (VulnCheck Advisory: Screen SFT DAB 600/C Firmware 1.9.3 Authentication Bypass Admin Password Change)
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.