Description
Screen SFT DAB 600/C firmware 1.9.3 contains a session management vulnerability that allows attackers to bypass authentication controls by exploiting IP address session binding. Attackers can reuse the same IP address and issue unauthorized requests to the userManager API to change user passwords without proper authentication.
Problem types
Missing Authentication for Critical Function
Product status
Credits
LiquidWorm as Gjoko Krstic of Zero Science Lab
References
www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5772.php
www.exploit-db.com/exploits/51456 (ExploitDB-51456)
www.dbbroadcast.com (DB Elettronica Telecomunicazioni Official Website)
www.dbbroadcast.com/...cts/radio/sft-dab-series-compact-air/ (SFT DAB Series Product Page)
www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5772.php (Zero Science Lab Disclosure (ZSL-2022-5772))
www.vulncheck.com/...e-authentication-bypass-password-change (VulnCheck Advisory: Screen SFT DAB 600/C Firmware 1.9.3 Authentication Bypass Password Change)
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.