Description
A security flaw has been discovered in Softland FBackup up to 9.9. This impacts an unknown function in the library C:\Program Files\Common Files\microsoft shared\ink\HID.dll of the component Backup/Restore. The manipulation results in link following. The attack needs to be approached locally. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-02-17
Score: 8.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Local File Access or Privilege Escalation
Action: Patch urgently
AI Analysis

Impact

The vulnerability resides in the HID.dll library used by Softland’s FBackup Backup/Restore feature on Windows. By supplying a crafted link, a local attacker can trigger a path‑traversal flaw that causes the system to follow arbitrary paths. This allows a privileged user to read, modify, or execute files on the host, potentially leading to information disclosure or privilege escalation.

Affected Systems

Softland FBackup versions up to 9.9 on Windows installations are affected. The flaw is confined to the HID.dll component located in C:\Program Files\Common Files\microsoft shared\ink. No other products or versions are reported as vulnerable at this time.

Risk and Exploitability

The CVSS score of 8.5 indicates high severity, while the EPSS of less than 1% suggests a low probability of widespread exploitation in the short term. The flaw requires local access, so the risk is limited to users who can log on or run programs on the affected machine. It is not listed in the CISA KEV catalog, reducing its visibility in large‑scale threat feeds.

Generated by OpenCVE AI on April 17, 2026 at 18:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest version of Softland FBackup that contains the fix for the HID.dll path‑traversal issue.
  • If an upgrade is not available, disable the Backup/Restore component or restrict file permissions on HID.dll so only trusted accounts can execute it.
  • Monitor the system for unexpected executions of HID.dll or abnormal file access patterns, and investigate any suspicious activity promptly.

Generated by OpenCVE AI on April 17, 2026 at 18:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 18 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 18 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Softland
Softland fbackup
Vendors & Products Softland
Softland fbackup

Tue, 17 Feb 2026 22:00:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in Softland FBackup up to 9.9. This impacts an unknown function in the library C:\Program Files\Common Files\microsoft shared\ink\HID.dll of the component Backup/Restore. The manipulation results in link following. The attack needs to be approached locally. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Title Softland FBackup Backup/Restore HID.dll link following
Weaknesses CWE-59
References
Metrics cvssV2_0

{'score': 6.8, 'vector': 'AV:L/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.8, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Softland Fbackup
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T10:16:10.914Z

Reserved: 2026-02-17T13:24:38.763Z

Link: CVE-2026-2627

cve-icon Vulnrichment

Updated: 2026-02-18T20:37:18.812Z

cve-icon NVD

Status : Deferred

Published: 2026-02-17T22:18:45.457

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-2627

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T19:00:11Z

Weaknesses