Description
Screen SFT DAB 600/C Firmware 1.9.3 contains a weak session management vulnerability that allows attackers to bypass authentication controls by reusing IP-bound session identifiers. Attackers can exploit the vulnerable deviceManagement API endpoint to reset device configurations by sending crafted POST requests with manipulated session parameters.
Problem types
Missing Authentication for Critical Function
Product status
Credits
LiquidWorm as Gjoko Krstic of Zero Science Lab
References
www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5775.php
www.exploit-db.com/exploits/51459 (ExploitDB-51459)
www.dbbroadcast.com (DB Elettronica Telecomunicazioni Product Homepage)
www.dbbroadcast.com/...cts/radio/sft-dab-series-compact-air/ (SFT DAB Series Product Page)
www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5775.php (Zero Science Lab Disclosure (ZSL-2022-5775))
www.vulncheck.com/...uthentication-bypass-reset-board-config (VulnCheck Advisory: Screen SFT DAB 600/C Firmware 1.9.3 Authentication Bypass Reset Board Config)
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.