Description
A weakness has been identified in qinming99 dst-admin up to 1.5.0. This impacts the function deleteBackup of the file src/main/java/com/tugos/dst/admin/controller/BackupController.java of the component File Handler. This manipulation causes denial of service. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-02-22
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch
AI Analysis

Impact

The vulnerability in the deleteBackup method of the BackupController allows remote actors to trigger a denial‑of‑service condition by manipulating the request flow. The flaw is classified as CWE‑404, indicating missing or inadequate error handling that permits the system to become unavailable. The affected code resides in the file handler component of qinming99 dst‑admin.

Affected Systems

All installations of qinming99 dst‑admin up to and including version 1.5.0 are affected. The faulty logic resides in the deleteBackup endpoint of the File Handler controller, which can be invoked remotely by an attacker with the ability to submit crafted requests.

Risk and Exploitability

The CVSS score of 5.3 places the vulnerability in the medium severity range, while the EPSS value of less than 1 % suggests that exploitation is presently unlikely to be widespread. The vulnerability is not listed in the CISA KEV catalog, but an exploit is publicly available, and the attack can be initiated remotely from outside the host. Given the medium severity and the possibility of a remote denial‑of‑service, systems running the affected version should treat this as a moderate risk that requires timely remediation.

Generated by OpenCVE AI on April 17, 2026 at 16:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify the installed version of dst‑admin; if it is 1.5.0 or earlier, upgrade to the latest release that contains the fix or apply the vendor’s patch once it is released.
  • If an upgrade is not immediately possible, restrict external access to the deleteBackup endpoint by using firewall rules or reverse‑proxy configuration to limit traffic to trusted users only.
  • Deploy monitoring for abnormal request volumes or repeated failures to the deleteBackup endpoint, and configure alerts to detect potential denial‑of‑service attempts.

Generated by OpenCVE AI on April 17, 2026 at 16:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Feb 2026 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Dst-admin Project
Dst-admin Project dst-admin
CPEs cpe:2.3:a:dst-admin_project:dst-admin:*:*:*:*:*:*:*:*
Vendors & Products Dst-admin Project
Dst-admin Project dst-admin

Mon, 23 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Qinming99
Qinming99 dst-admin
Vendors & Products Qinming99
Qinming99 dst-admin

Sun, 22 Feb 2026 23:15:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in qinming99 dst-admin up to 1.5.0. This impacts the function deleteBackup of the file src/main/java/com/tugos/dst/admin/controller/BackupController.java of the component File Handler. This manipulation causes denial of service. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Title qinming99 dst-admin File BackupController.java deleteBackup denial of service
Weaknesses CWE-404
References
Metrics cvssV2_0

{'score': 5.5, 'vector': 'AV:N/AC:L/Au:S/C:N/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 5.4, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Dst-admin Project Dst-admin
Qinming99 Dst-admin
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T14:34:05.937Z

Reserved: 2026-02-22T07:14:22.107Z

Link: CVE-2026-2957

cve-icon Vulnrichment

Updated: 2026-02-23T14:33:59.132Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-22T23:15:59.700

Modified: 2026-02-25T17:36:59.833

Link: CVE-2026-2957

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T16:30:05Z

Weaknesses