METIS WIC devices (versions <= oscore 2.1.234-r18) expose a web-based shell at the /console endpoint that does not require authentication. Accessing this endpoint allows a remote attacker to execute arbitrary operating system commands with root (UID 0) privileges. This results in full system compromise, allowing unauthorized access to modify system configuration, read sensitive data, or disrupt device operations
References
Link Providers
https://www.metis.tech/ cve-icon cve-icon
History

Wed, 11 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 11 Feb 2026 14:30:00 +0000

Type Values Removed Values Added
Description METIS WIC devices (versions <= oscore 2.1.234-r18) expose a web-based shell at the /console endpoint that does not require authentication. Accessing this endpoint allows a remote attacker to execute arbitrary operating system commands with root (UID 0) privileges. This results in full system compromise, allowing unauthorized access to modify system configuration, read sensitive data, or disrupt device operations
Title Unauthenticated Remote Root Shell Access via Web Console in METIS WIC
Weaknesses CWE-287
CWE-306
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: MHV

Published:

Updated: 2026-02-11T14:54:45.412Z

Reserved: 2026-02-09T13:38:41.942Z

Link: CVE-2026-2248

cve-icon Vulnrichment

Updated: 2026-02-11T14:54:24.536Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-11T15:16:17.433

Modified: 2026-02-11T15:27:26.370

Link: CVE-2026-2248

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.