Below is the summary of the key vulnerability information extracted from the website screenshot provided, formatted in a simple markdown: Vulnerability Details: - ID: VDB-347410, CVE-2026-3052 - Component: DataLinkDC dinky up to 1.2.5 - CWE: CWE-918 (Server-Side Request Forgery) - CVSS Meta Temp Score: 5.7 - CTI Interest Score: 1.54 - Exploit Price Range: $0-$5k Description: - A critical vulnerability is found in the DataLinkDC dinky version up to 1.2.5, specifically in the function of the file within the Flink Proxy Controller. It is possible to manipulate the system, resulting in Server-Side Request Forgery (SSRF) attacks. - The vulnerability allows for remote attack initiation, and an exploit is already known. Summary Overview: - It is possible that an attacker can forge server-side requests leading to compromise of data confidentiality, integrity, and availability by using an unknown input. Advisory: The advisory information can be found on github.com. Note: The vendor was informed of the vulnerability but did not reply.