CVE-2023-53776
Severity CVSS v4.0:
HIGH
Type:
Unavailable / Other
Publication date:
10/12/2025
Last modified:
02/01/2026
Description
Screen SFT DAB 1.9.3 contains an authentication bypass vulnerability that allows attackers to exploit weak session management by reusing IP-bound session identifiers. Attackers can issue unauthorized requests to the device management API by leveraging the session binding mechanism to perform critical operations on the transmitter.
Impact
Base Score 4.0
8.70
Severity 4.0
HIGH
Base Score 3.x
8.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:dbbroadcast:sft_dab_600\/c_firmware:1.9.3:*:*:*:*:*:*:* | ||
| cpe:2.3:h:dbbroadcast:sft_dab_600\/c:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://www.dbbroadcast.com
- https://www.dbbroadcast.com/products/radio/sft-dab-series-compact-air/
- https://www.exploit-db.com/exploits/51459
- https://www.screen.it
- https://www.vulncheck.com/advisories/screen-sft-dab-authentication-bypass-via-session-management-weakness
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5775.php
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5775.php



