Home

Description

Screen SFT DAB 600/C Firmware 1.9.3 contains a weak session management vulnerability that allows attackers to bypass authentication controls by reusing IP-bound session identifiers. Attackers can exploit the vulnerable deviceManagement API endpoint to reset device configurations by sending crafted POST requests with manipulated session parameters.

PUBLISHED Reserved 2025-12-20 | Published 2025-12-22 | Updated 2025-12-22 | Assigner VulnCheck




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

Missing Authentication for Critical Function

Product status

-
affected

Credits

LiquidWorm as Gjoko Krstic of Zero Science Lab finder

References

www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5775.php exploit

www.exploit-db.com/exploits/51459 (ExploitDB-51459) exploit

www.dbbroadcast.com (DB Elettronica Telecomunicazioni Product Homepage) product

www.dbbroadcast.com/...cts/radio/sft-dab-series-compact-air/ (SFT DAB Series Product Page) product

www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5775.php (Zero Science Lab Disclosure (ZSL-2022-5775)) third-party-advisory

www.vulncheck.com/...uthentication-bypass-reset-board-config (VulnCheck Advisory: Screen SFT DAB 600/C Firmware 1.9.3 Authentication Bypass Reset Board Config) third-party-advisory

cve.org (CVE-2023-53970)

nvd.nist.gov (CVE-2023-53970)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.