Cyber Posture

CVE-2026-2957

MediumPublic PoC

Published: 22 February 2026

Published
22 February 2026
Modified
25 February 2026
KEV Added
Patch
CVSS Score 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
EPSS Score 0.0006 20.1th percentile
Risk Priority 11 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-2957 is a medium-severity Improper Resource Shutdown or Release (CWE-404) vulnerability in Dst-Admin Project Dst-Admin. Its CVSS base score is 5.4 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 20.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-404

Contingency plan updates incorporate proper resource shutdown and release steps, preventing attackers from leveraging incomplete cleanup during recovery scenarios.

addresses: CWE-404

Mandates explicit shutdown of the network connection at session conclusion, directly addressing improper resource release.

addresses: CWE-404

Requires proper shutdown/release procedures that include overwriting or isolating data to block unintended transfer via reused system objects.

addresses: CWE-404

Procedures can mandate orderly shutdown or release of resources when failures occur, preventing improper resource handling after a fault.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Remote exploitable DoS in public-facing Java web controller (deleteBackup) directly enables T1190 for initial access and T1499.004 for application exploitation causing partial availability/integrity impact.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A weakness has been identified in qinming99 dst-admin up to 1.5.0. This impacts the function deleteBackup of the file src/main/java/com/tugos/dst/admin/controller/BackupController.java of the component File Handler. This manipulation causes denial of service. The attack may be initiated remotely. The exploit has…

more

been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.

Deeper analysisAI

CVE-2026-2957 is a vulnerability identified in qinming99 dst-admin versions up to 1.5.0. It affects the deleteBackup function in the file src/main/java/com/tugos/dst/admin/controller/BackupController.java within the File Handler component, leading to a denial of service condition. The issue is classified under CWE-404 and has a CVSS v3.1 base score of 5.4 (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L).

The vulnerability can be exploited remotely by an attacker with low privileges. Exploitation requires network access and low-privilege authentication but no user interaction, enabling the attacker to cause limited integrity and availability impacts, such as partial denial of service, without affecting confidentiality.

VulDB advisories note that an exploit has been made publicly available and could be used for attacks. The vendor was contacted early regarding this disclosure but did not respond, indicating no official patches or mitigations have been issued.

Details

CWE(s)

Affected Products

dst-admin project
dst-admin
≤ 1.5.0

CVEs Like This One

CVE-2026-2956Same product: Dst-Admin Project Dst-Admin
CVE-2024-57623Shared CWE-404
CVE-2026-1974Shared CWE-404
CVE-2026-1171Shared CWE-404
CVE-2024-57661Shared CWE-404
CVE-2024-57654Shared CWE-404
CVE-2025-24811Shared CWE-404
CVE-2025-15528Shared CWE-404
CVE-2026-1173Shared CWE-404
CVE-2024-57618Shared CWE-404

References