CVE-2026-2957: Denial of Service in qinming99 dst-admin
CVE-2026-2957 is a medium severity denial of service (DoS) vulnerability affecting qinming99 dst-admin versions up to 1. 5. 0. The flaw exists in the deleteBackup function within the BackupController. java file, part of the File Handler component. An attacker with limited privileges can remotely trigger this vulnerability without user interaction, causing the application to become unavailable. Although the vendor has not responded to the disclosure, no patches have been released yet. Exploit code is publicly available, increasing the risk of exploitation. This vulnerability primarily impacts the availability of the dst-admin service, potentially disrupting backup management operations. Organizations using dst-admin should prioritize mitigating this issue to maintain service continuity.
AI Analysis
Technical Summary
CVE-2026-2957 is a denial of service vulnerability identified in the qinming99 dst-admin product, specifically affecting all versions up to and including 1.5.0. The vulnerability resides in the deleteBackup function of the BackupController.java source file, which is responsible for handling backup deletion requests. This function is part of the File Handler component, and improper handling of input or state within this function allows an attacker to cause the application to crash or become unresponsive, resulting in denial of service. The vulnerability can be exploited remotely without requiring user interaction, but it does require the attacker to have limited privileges (PR:L), indicating some level of authentication or access is necessary. The CVSS 4.0 vector indicates no user interaction is needed, no scope change occurs, and the impact is primarily on availability with limited impact on integrity and confidentiality. The vendor was notified early but has not issued any patches or advisories, and exploit code has been publicly released, increasing the risk of exploitation. This vulnerability could disrupt backup management processes and overall system availability for organizations relying on dst-admin for administrative tasks.
Potential Impact
The primary impact of CVE-2026-2957 is denial of service, which can cause the dst-admin application to become unavailable or crash when the deleteBackup function is exploited. This disruption can affect backup management workflows, potentially delaying critical backup or recovery operations. Organizations relying on dst-admin for system administration or backup handling may experience operational downtime, impacting business continuity and possibly leading to data loss if backups cannot be managed properly. Since the exploit requires limited privileges but no user interaction, insider threats or compromised accounts could leverage this vulnerability to disrupt services. The public availability of exploit code increases the likelihood of attacks, especially in environments where dst-admin is exposed to untrusted networks. Although the vulnerability does not directly compromise confidentiality or integrity, the availability impact alone can have significant operational consequences, particularly in sectors where uptime and backup reliability are critical.
Mitigation Recommendations
Given the absence of an official patch from the vendor, organizations should implement several specific mitigations: 1) Restrict network access to the dst-admin interface, limiting it to trusted IP addresses and internal networks only. 2) Enforce strict access controls and monitor accounts with privileges sufficient to invoke the deleteBackup function to prevent unauthorized use. 3) Implement application-layer firewalls or web application firewalls (WAFs) with rules designed to detect and block suspicious requests targeting the deleteBackup endpoint. 4) Monitor logs for unusual activity related to backup deletion attempts and set up alerts for potential exploitation attempts. 5) Consider isolating the dst-admin service in a segmented network zone to reduce exposure. 6) If feasible, temporarily disable or restrict the backup deletion functionality until a patch or official fix is released. 7) Engage in proactive incident response planning to quickly detect and respond to any denial of service incidents related to this vulnerability. 8) Stay informed on vendor updates or third-party patches addressing this issue and apply them promptly once available.
Affected Countries
China, United States, India, Germany, United Kingdom, France, Japan, South Korea, Brazil, Russia
CVE-2026-2957: Denial of Service in qinming99 dst-admin
Description
CVE-2026-2957 is a medium severity denial of service (DoS) vulnerability affecting qinming99 dst-admin versions up to 1. 5. 0. The flaw exists in the deleteBackup function within the BackupController. java file, part of the File Handler component. An attacker with limited privileges can remotely trigger this vulnerability without user interaction, causing the application to become unavailable. Although the vendor has not responded to the disclosure, no patches have been released yet. Exploit code is publicly available, increasing the risk of exploitation. This vulnerability primarily impacts the availability of the dst-admin service, potentially disrupting backup management operations. Organizations using dst-admin should prioritize mitigating this issue to maintain service continuity.
AI-Powered Analysis
Technical Analysis
CVE-2026-2957 is a denial of service vulnerability identified in the qinming99 dst-admin product, specifically affecting all versions up to and including 1.5.0. The vulnerability resides in the deleteBackup function of the BackupController.java source file, which is responsible for handling backup deletion requests. This function is part of the File Handler component, and improper handling of input or state within this function allows an attacker to cause the application to crash or become unresponsive, resulting in denial of service. The vulnerability can be exploited remotely without requiring user interaction, but it does require the attacker to have limited privileges (PR:L), indicating some level of authentication or access is necessary. The CVSS 4.0 vector indicates no user interaction is needed, no scope change occurs, and the impact is primarily on availability with limited impact on integrity and confidentiality. The vendor was notified early but has not issued any patches or advisories, and exploit code has been publicly released, increasing the risk of exploitation. This vulnerability could disrupt backup management processes and overall system availability for organizations relying on dst-admin for administrative tasks.
Potential Impact
The primary impact of CVE-2026-2957 is denial of service, which can cause the dst-admin application to become unavailable or crash when the deleteBackup function is exploited. This disruption can affect backup management workflows, potentially delaying critical backup or recovery operations. Organizations relying on dst-admin for system administration or backup handling may experience operational downtime, impacting business continuity and possibly leading to data loss if backups cannot be managed properly. Since the exploit requires limited privileges but no user interaction, insider threats or compromised accounts could leverage this vulnerability to disrupt services. The public availability of exploit code increases the likelihood of attacks, especially in environments where dst-admin is exposed to untrusted networks. Although the vulnerability does not directly compromise confidentiality or integrity, the availability impact alone can have significant operational consequences, particularly in sectors where uptime and backup reliability are critical.
Mitigation Recommendations
Given the absence of an official patch from the vendor, organizations should implement several specific mitigations: 1) Restrict network access to the dst-admin interface, limiting it to trusted IP addresses and internal networks only. 2) Enforce strict access controls and monitor accounts with privileges sufficient to invoke the deleteBackup function to prevent unauthorized use. 3) Implement application-layer firewalls or web application firewalls (WAFs) with rules designed to detect and block suspicious requests targeting the deleteBackup endpoint. 4) Monitor logs for unusual activity related to backup deletion attempts and set up alerts for potential exploitation attempts. 5) Consider isolating the dst-admin service in a segmented network zone to reduce exposure. 6) If feasible, temporarily disable or restrict the backup deletion functionality until a patch or official fix is released. 7) Engage in proactive incident response planning to quickly detect and respond to any denial of service incidents related to this vulnerability. 8) Stay informed on vendor updates or third-party patches addressing this issue and apply them promptly once available.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-22T07:14:22.107Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699b8e79be58cf853bbd6216
Added to database: 2/22/2026, 11:17:13 PM
Last enriched: 2/22/2026, 11:31:27 PM
Last updated: 2/23/2026, 7:18:30 AM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2976: Information Disclosure in FastApiAdmin
MediumCVE-2026-2975: Information Disclosure in FastApiAdmin
MediumCVE-2026-2974: Exposure of Backup File to an Unauthorized Control Sphere in AliasVault App
LowCVE-2026-2971: Cross Site Scripting in a466350665 Smart-SSO
MediumCVE-2026-2970: Deserialization in datapizza-labs datapizza-ai
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.