← Back to CVEs
CVE-2023-53968
CRITICAL9.8
Description
Screen SFT DAB 600/C Firmware 1.9.3 contains a session management vulnerability that allows attackers to bypass authentication controls by exploiting IP address session binding. Attackers can reuse the same IP address and issue unauthorized requests to the userManager API to remove user accounts without proper authentication.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published12/22/2025
Last Modified12/26/2025
Sourcenvd
Honeypot Sightings0
Affected Products
dbbroadcast:sft_dab_600\/cdbbroadcast:sft_dab_600\/c_firmware
Weaknesses (CWE)
CWE-306
References
https://www.dbbroadcast.com(disclosure@vulncheck.com)
https://www.dbbroadcast.com/products/radio/sft-dab-series-compact-air/(disclosure@vulncheck.com)
https://www.exploit-db.com/exploits/51457(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/screen-sft-dab-c-firmware-authentication-bypass-erase-account(disclosure@vulncheck.com)
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5773.php(disclosure@vulncheck.com)
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5773.php(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.