METIS WIC devices (versions <= oscore 2.1.234-r18) expose a web-based shell at the /console endpoint that does not require authentication. Accessing this endpoint allows a remote attacker to execute arbitrary operating system commands with root (UID 0) privileges. This results in full system compromise, allowing unauthorized access to modify system configuration, read sensitive data, or disrupt device operations
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://www.metis.tech/ |
|
History
Wed, 11 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 11 Feb 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | METIS WIC devices (versions <= oscore 2.1.234-r18) expose a web-based shell at the /console endpoint that does not require authentication. Accessing this endpoint allows a remote attacker to execute arbitrary operating system commands with root (UID 0) privileges. This results in full system compromise, allowing unauthorized access to modify system configuration, read sensitive data, or disrupt device operations | |
| Title | Unauthenticated Remote Root Shell Access via Web Console in METIS WIC | |
| Weaknesses | CWE-287 CWE-306 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: MHV
Published:
Updated: 2026-02-11T14:54:45.412Z
Reserved: 2026-02-09T13:38:41.942Z
Link: CVE-2026-2248
Updated: 2026-02-11T14:54:24.536Z
Status : Awaiting Analysis
Published: 2026-02-11T15:16:17.433
Modified: 2026-02-11T15:27:26.370
Link: CVE-2026-2248
No data.
OpenCVE Enrichment
No data.