Screen SFT DAB 600/C Firmware 1.9.3 contains a weak session management vulnerability that allows attackers to bypass authentication controls by reusing IP-bound session identifiers. Attackers can exploit the vulnerable deviceManagement API endpoint to reset device configurations by sending crafted POST requests with manipulated session parameters.
| Software | From | Fixed in |
|---|---|---|
| dbbroadcast / sft_dab_600/c_firmware | 1.9.3 | 1.9.3.x |