CVE-2023-53740
Severity CVSS v4.0:
HIGH
Type:
Unavailable / Other
Publication date:
10/12/2025
Last modified:
17/12/2025
Description
Screen SFT DAB 1.9.3 contains an authentication bypass vulnerability that allows attackers to change the admin password without providing the current credentials. Attackers can exploit the userManager.cgx endpoint by sending a crafted JSON request with a new MD5-hashed password to directly modify the admin account.
Impact
Base Score 4.0
8.60
Severity 4.0
HIGH
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:dbbroadcast:sft_dab_015\/c_firmware:1.9.3:*:*:*:*:*:*:* | ||
| cpe:2.3:h:dbbroadcast:sft_dab_015\/c:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:dbbroadcast:sft_dab_050\/c_firmware:1.9.3:*:*:*:*:*:*:* | ||
| cpe:2.3:h:dbbroadcast:sft_dab_050\/c:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:dbbroadcast:sft_dab_150\/c_firmware:1.9.3:*:*:*:*:*:*:* | ||
| cpe:2.3:h:dbbroadcast:sft_dab_150\/c:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:dbbroadcast:sft_dab_300\/c_firmware:1.9.3:*:*:*:*:*:*:* | ||
| cpe:2.3:h:dbbroadcast:sft_dab_300\/c:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:dbbroadcast:sft_dab_600\/c_firmware:1.9.3:*:*:*:*:*:*:* | ||
| cpe:2.3:h:dbbroadcast:sft_dab_600\/c:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://www.dbbroadcast.com
- https://www.dbbroadcast.com/products/radio/sft-dab-series-compact-air/
- https://www.exploit-db.com/exploits/51458
- https://www.screen.it
- https://www.vulncheck.com/advisories/screen-sft-dab-authentication-bypass-via-admin-password-change
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5774.php
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5774.php



