Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2957: Denial of Service in qinming99 dst-admin

0
Medium
VulnerabilityCVE-2026-2957cvecve-2026-2957
Published: Sun Feb 22 2026 (02/22/2026, 23:02:42 UTC)
Source: CVE Database V5
Vendor/Project: qinming99
Product: dst-admin

Description

A weakness has been identified in qinming99 dst-admin up to 1.5.0. This impacts the function deleteBackup of the file src/main/java/com/tugos/dst/admin/controller/BackupController.java of the component File Handler. This manipulation causes denial of service. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/02/2026, 06:35:08 UTC

Technical Analysis

CVE-2026-2957 is a denial of service (DoS) vulnerability identified in the qinming99 dst-admin product, specifically affecting versions 1.0 through 1.5.0. The vulnerability resides in the deleteBackup function of the BackupController.java source file, which is part of the File Handler component responsible for managing backup deletions. The flaw allows an attacker to remotely manipulate this function, causing the application to enter a denial of service state, rendering backup management functionalities unavailable. The vulnerability can be exploited without user interaction and requires only low-level privileges, making it accessible to a wider range of attackers with some access to the system. The vendor was notified early but has not issued any patches or responses, and the exploit code has been publicly disclosed, increasing the likelihood of exploitation attempts. The CVSS 4.0 base score is 5.3 (medium), reflecting the moderate impact on availability and the ease of remote exploitation without authentication. The vulnerability does not affect confidentiality or integrity directly but can disrupt critical backup operations, potentially impacting business continuity. No mitigations or patches have been officially released, leaving organizations dependent on alternative protective measures. The vulnerability is classified as a medium severity DoS issue with a scope limited to the dst-admin application and its backup management functionality.

Potential Impact

The primary impact of CVE-2026-2957 is the disruption of backup management services within the qinming99 dst-admin application, leading to denial of service conditions. Organizations relying on dst-admin for backup operations may experience service outages, preventing them from deleting backups or managing backup data effectively. This can result in operational downtime, delayed recovery processes, and increased risk during disaster recovery scenarios. Although the vulnerability does not compromise data confidentiality or integrity, the loss of availability can have significant business implications, especially for organizations with strict backup retention policies or regulatory requirements. The public availability of exploit code increases the risk of automated attacks or opportunistic exploitation, potentially affecting multiple organizations simultaneously. The lack of vendor response and patches prolongs exposure, forcing organizations to rely on compensating controls. The scope is limited to dst-admin users, but given the critical nature of backup management, the impact on affected organizations can be moderate to high in operational terms.

Mitigation Recommendations

Since no official patches or updates have been released by the vendor, organizations should implement the following specific mitigation strategies: 1) Restrict network access to the dst-admin application, limiting exposure to trusted IP addresses and internal networks only. 2) Enforce strict access controls and monitor user privileges to ensure that only authorized personnel with necessary low-level privileges can access backup management functions. 3) Implement application-layer firewalls or web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the deleteBackup function or related endpoints. 4) Monitor application logs and network traffic for unusual activity or repeated requests that could indicate exploitation attempts. 5) Consider deploying rate limiting on backup deletion endpoints to reduce the risk of DoS through repeated triggering. 6) Prepare incident response plans focused on backup service disruptions, including alternative backup management workflows. 7) Evaluate the feasibility of isolating the dst-admin service in a segmented environment to contain potential impacts. 8) Stay alert for vendor updates or community patches and apply them promptly once available. These targeted measures go beyond generic advice by focusing on access restriction, monitoring, and traffic filtering specific to the vulnerable function.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-22T07:14:22.107Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699b8e79be58cf853bbd6216

Added to database: 2/22/2026, 11:17:13 PM

Last enriched: 3/2/2026, 6:35:08 AM

Last updated: 4/9/2026, 11:49:12 AM

Views: 53

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses