← Back to CVEs
CVE-2023-53740
CRITICAL9.8
Description
Screen SFT DAB 1.9.3 contains an authentication bypass vulnerability that allows attackers to change the admin password without providing the current credentials. Attackers can exploit the userManager.cgx endpoint by sending a crafted JSON request with a new MD5-hashed password to directly modify the admin account.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published12/10/2025
Last Modified12/17/2025
Sourcenvd
Honeypot Sightings0
Affected Products
dbbroadcast:sft_dab_015\/cdbbroadcast:sft_dab_015\/c_firmwaredbbroadcast:sft_dab_050\/cdbbroadcast:sft_dab_050\/c_firmwaredbbroadcast:sft_dab_150\/cdbbroadcast:sft_dab_150\/c_firmwaredbbroadcast:sft_dab_300\/cdbbroadcast:sft_dab_300\/c_firmwaredbbroadcast:sft_dab_600\/cdbbroadcast:sft_dab_600\/c_firmware
Weaknesses (CWE)
CWE-862
References
https://www.dbbroadcast.com(disclosure@vulncheck.com)
https://www.dbbroadcast.com/products/radio/sft-dab-series-compact-air/(disclosure@vulncheck.com)
https://www.exploit-db.com/exploits/51458(disclosure@vulncheck.com)
https://www.screen.it(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/screen-sft-dab-authentication-bypass-via-admin-password-change(disclosure@vulncheck.com)
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5774.php(disclosure@vulncheck.com)
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5774.php(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.