CVE-2026-2957: Denial of Service in qinming99 dst-admin
A weakness has been identified in qinming99 dst-admin up to 1.5.0. This impacts the function deleteBackup of the file src/main/java/com/tugos/dst/admin/controller/BackupController.java of the component File Handler. This manipulation causes denial of service. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2026-2957 is a denial of service (DoS) vulnerability identified in the qinming99 dst-admin product, specifically affecting versions 1.0 through 1.5.0. The vulnerability resides in the deleteBackup function of the BackupController.java source file, which is part of the File Handler component responsible for managing backup deletions. The flaw allows an attacker to remotely manipulate this function, causing the application to enter a denial of service state, rendering backup management functionalities unavailable. The vulnerability can be exploited without user interaction and requires only low-level privileges, making it accessible to a wider range of attackers with some access to the system. The vendor was notified early but has not issued any patches or responses, and the exploit code has been publicly disclosed, increasing the likelihood of exploitation attempts. The CVSS 4.0 base score is 5.3 (medium), reflecting the moderate impact on availability and the ease of remote exploitation without authentication. The vulnerability does not affect confidentiality or integrity directly but can disrupt critical backup operations, potentially impacting business continuity. No mitigations or patches have been officially released, leaving organizations dependent on alternative protective measures. The vulnerability is classified as a medium severity DoS issue with a scope limited to the dst-admin application and its backup management functionality.
Potential Impact
The primary impact of CVE-2026-2957 is the disruption of backup management services within the qinming99 dst-admin application, leading to denial of service conditions. Organizations relying on dst-admin for backup operations may experience service outages, preventing them from deleting backups or managing backup data effectively. This can result in operational downtime, delayed recovery processes, and increased risk during disaster recovery scenarios. Although the vulnerability does not compromise data confidentiality or integrity, the loss of availability can have significant business implications, especially for organizations with strict backup retention policies or regulatory requirements. The public availability of exploit code increases the risk of automated attacks or opportunistic exploitation, potentially affecting multiple organizations simultaneously. The lack of vendor response and patches prolongs exposure, forcing organizations to rely on compensating controls. The scope is limited to dst-admin users, but given the critical nature of backup management, the impact on affected organizations can be moderate to high in operational terms.
Mitigation Recommendations
Since no official patches or updates have been released by the vendor, organizations should implement the following specific mitigation strategies: 1) Restrict network access to the dst-admin application, limiting exposure to trusted IP addresses and internal networks only. 2) Enforce strict access controls and monitor user privileges to ensure that only authorized personnel with necessary low-level privileges can access backup management functions. 3) Implement application-layer firewalls or web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the deleteBackup function or related endpoints. 4) Monitor application logs and network traffic for unusual activity or repeated requests that could indicate exploitation attempts. 5) Consider deploying rate limiting on backup deletion endpoints to reduce the risk of DoS through repeated triggering. 6) Prepare incident response plans focused on backup service disruptions, including alternative backup management workflows. 7) Evaluate the feasibility of isolating the dst-admin service in a segmented environment to contain potential impacts. 8) Stay alert for vendor updates or community patches and apply them promptly once available. These targeted measures go beyond generic advice by focusing on access restriction, monitoring, and traffic filtering specific to the vulnerable function.
Affected Countries
China, United States, India, Germany, Brazil, Russia, South Korea, Japan, United Kingdom, France
CVE-2026-2957: Denial of Service in qinming99 dst-admin
Description
A weakness has been identified in qinming99 dst-admin up to 1.5.0. This impacts the function deleteBackup of the file src/main/java/com/tugos/dst/admin/controller/BackupController.java of the component File Handler. This manipulation causes denial of service. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-2957 is a denial of service (DoS) vulnerability identified in the qinming99 dst-admin product, specifically affecting versions 1.0 through 1.5.0. The vulnerability resides in the deleteBackup function of the BackupController.java source file, which is part of the File Handler component responsible for managing backup deletions. The flaw allows an attacker to remotely manipulate this function, causing the application to enter a denial of service state, rendering backup management functionalities unavailable. The vulnerability can be exploited without user interaction and requires only low-level privileges, making it accessible to a wider range of attackers with some access to the system. The vendor was notified early but has not issued any patches or responses, and the exploit code has been publicly disclosed, increasing the likelihood of exploitation attempts. The CVSS 4.0 base score is 5.3 (medium), reflecting the moderate impact on availability and the ease of remote exploitation without authentication. The vulnerability does not affect confidentiality or integrity directly but can disrupt critical backup operations, potentially impacting business continuity. No mitigations or patches have been officially released, leaving organizations dependent on alternative protective measures. The vulnerability is classified as a medium severity DoS issue with a scope limited to the dst-admin application and its backup management functionality.
Potential Impact
The primary impact of CVE-2026-2957 is the disruption of backup management services within the qinming99 dst-admin application, leading to denial of service conditions. Organizations relying on dst-admin for backup operations may experience service outages, preventing them from deleting backups or managing backup data effectively. This can result in operational downtime, delayed recovery processes, and increased risk during disaster recovery scenarios. Although the vulnerability does not compromise data confidentiality or integrity, the loss of availability can have significant business implications, especially for organizations with strict backup retention policies or regulatory requirements. The public availability of exploit code increases the risk of automated attacks or opportunistic exploitation, potentially affecting multiple organizations simultaneously. The lack of vendor response and patches prolongs exposure, forcing organizations to rely on compensating controls. The scope is limited to dst-admin users, but given the critical nature of backup management, the impact on affected organizations can be moderate to high in operational terms.
Mitigation Recommendations
Since no official patches or updates have been released by the vendor, organizations should implement the following specific mitigation strategies: 1) Restrict network access to the dst-admin application, limiting exposure to trusted IP addresses and internal networks only. 2) Enforce strict access controls and monitor user privileges to ensure that only authorized personnel with necessary low-level privileges can access backup management functions. 3) Implement application-layer firewalls or web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the deleteBackup function or related endpoints. 4) Monitor application logs and network traffic for unusual activity or repeated requests that could indicate exploitation attempts. 5) Consider deploying rate limiting on backup deletion endpoints to reduce the risk of DoS through repeated triggering. 6) Prepare incident response plans focused on backup service disruptions, including alternative backup management workflows. 7) Evaluate the feasibility of isolating the dst-admin service in a segmented environment to contain potential impacts. 8) Stay alert for vendor updates or community patches and apply them promptly once available. These targeted measures go beyond generic advice by focusing on access restriction, monitoring, and traffic filtering specific to the vulnerable function.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-22T07:14:22.107Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699b8e79be58cf853bbd6216
Added to database: 2/22/2026, 11:17:13 PM
Last enriched: 3/2/2026, 6:35:08 AM
Last updated: 4/9/2026, 11:49:12 AM
Views: 53
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.