CVE-2023-53968

Screen SFT DAB 600/C Firmware 1.9.3 contains a session management vulnerability that allows attackers to bypass authentication controls by exploiting IP address session binding. Attackers can reuse the same IP address and issue unauthorized requests to the userManager API to remove user accounts without proper authentication.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dbbroadcast:sft_dab_600\/c_firmware:1.9.3:*:*:*:*:*:*:*
cpe:2.3:h:dbbroadcast:sft_dab_600\/c:-:*:*:*:*:*:*:*

History

26 Dec 2025, 16:45

Type Values Removed Values Added
CPE cpe:2.3:o:dbbroadcast:sft_dab_600\/c_firmware:1.9.3:*:*:*:*:*:*:*
cpe:2.3:h:dbbroadcast:sft_dab_600\/c:-:*:*:*:*:*:*:*
References () https://www.dbbroadcast.com - () https://www.dbbroadcast.com - Product
References () https://www.dbbroadcast.com/products/radio/sft-dab-series-compact-air/ - () https://www.dbbroadcast.com/products/radio/sft-dab-series-compact-air/ - Product
References () https://www.exploit-db.com/exploits/51457 - () https://www.exploit-db.com/exploits/51457 - Exploit
References () https://www.vulncheck.com/advisories/screen-sft-dab-c-firmware-authentication-bypass-erase-account - () https://www.vulncheck.com/advisories/screen-sft-dab-c-firmware-authentication-bypass-erase-account - Third Party Advisory, Exploit
References () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5773.php - () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5773.php - Exploit, Third Party Advisory
First Time Dbbroadcast
Dbbroadcast sft Dab 600\/c Firmware
Dbbroadcast sft Dab 600\/c

22 Dec 2025, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-22 22:16

Updated : 2025-12-26 16:45


NVD link : CVE-2023-53968

Mitre link : CVE-2023-53968

CVE.ORG link : CVE-2023-53968


JSON object : View

Products Affected

dbbroadcast

  • sft_dab_600\/c
  • sft_dab_600\/c_firmware
CWE
CWE-306

Missing Authentication for Critical Function