CVE-2023-53969

Screen SFT DAB 600/C firmware 1.9.3 contains a session management vulnerability that allows attackers to bypass authentication controls by exploiting IP address session binding. Attackers can reuse the same IP address and issue unauthorized requests to the userManager API to change user passwords without proper authentication.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dbbroadcast:sft_dab_600\/c_firmware:1.9.3:*:*:*:*:*:*:*
cpe:2.3:h:dbbroadcast:sft_dab_600\/c:-:*:*:*:*:*:*:*

History

26 Dec 2025, 16:50

Type Values Removed Values Added
First Time Dbbroadcast
Dbbroadcast sft Dab 600\/c Firmware
Dbbroadcast sft Dab 600\/c
CPE cpe:2.3:o:dbbroadcast:sft_dab_600\/c_firmware:1.9.3:*:*:*:*:*:*:*
cpe:2.3:h:dbbroadcast:sft_dab_600\/c:-:*:*:*:*:*:*:*
References () https://www.dbbroadcast.com - () https://www.dbbroadcast.com - Product
References () https://www.dbbroadcast.com/products/radio/sft-dab-series-compact-air/ - () https://www.dbbroadcast.com/products/radio/sft-dab-series-compact-air/ - Product
References () https://www.exploit-db.com/exploits/51456 - () https://www.exploit-db.com/exploits/51456 - Exploit
References () https://www.vulncheck.com/advisories/screen-sft-dab-c-firmware-authentication-bypass-password-change - () https://www.vulncheck.com/advisories/screen-sft-dab-c-firmware-authentication-bypass-password-change - Third Party Advisory
References () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5772.php - () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5772.php - Exploit, Third Party Advisory

22 Dec 2025, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-22 22:16

Updated : 2025-12-26 16:50


NVD link : CVE-2023-53969

Mitre link : CVE-2023-53969

CVE.ORG link : CVE-2023-53969


JSON object : View

Products Affected

dbbroadcast

  • sft_dab_600\/c
  • sft_dab_600\/c_firmware
CWE
CWE-306

Missing Authentication for Critical Function