VYPR

Screen Sft Dab 600/c

by Db Elettronica Telecomunicazioni Spa

CVEs (5)

  • CVE-2023-53970Dec 22, 2025
    risk 0.00cvss epss 0.00

    Screen SFT DAB 600/C Firmware 1.9.3 contains a weak session management vulnerability that allows attackers to bypass authentication controls by reusing IP-bound session identifiers. Attackers can exploit the vulnerable deviceManagement API endpoint to reset device configurations by sending crafted POST requests with manipulated session parameters.

  • CVE-2023-53969Dec 22, 2025
    risk 0.00cvss epss 0.00

    Screen SFT DAB 600/C firmware 1.9.3 contains a session management vulnerability that allows attackers to bypass authentication controls by exploiting IP address session binding. Attackers can reuse the same IP address and issue unauthorized requests to the userManager API to change user passwords without proper authentication.

  • CVE-2023-53968Dec 22, 2025
    risk 0.00cvss epss 0.01

    Screen SFT DAB 600/C Firmware 1.9.3 contains a session management vulnerability that allows attackers to bypass authentication controls by exploiting IP address session binding. Attackers can reuse the same IP address and issue unauthorized requests to the userManager API to remove user accounts without proper authentication.

  • CVE-2023-53967Dec 22, 2025
    risk 0.00cvss epss 0.00

    Screen SFT DAB 600/C firmware 1.9.3 contains an authentication bypass vulnerability that allows attackers to change the admin password without requiring the current credentials. Attackers can exploit the userManager.cgx API endpoint by sending a crafted POST request with a new MD5-hashed password to directly modify the admin account's authentication.

  • CVE-2023-7328Nov 14, 2025
    risk 0.00cvss epss 0.00

    Screen SFT DAB 600/C firmware versions up to and including 1.9.3 contain an improper access control on the user management API allows unauthenticated requests to retrieve structured user data, including account names and connection metadata such as client IP and timeout values.