The /dbviewer/ web endpoint in METIS WIC devices is exposed without authentication. A remote attacker can access and export the internal telemetry SQLite database containing sensitive operational data. Additionally, the application is configured with debug mode enabled, causing malformed requests to return verbose Django tracebacks that disclose backend source code, local file paths, and system configuration.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://www.metis.tech/ |
|
History
Wed, 11 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 11 Feb 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The /dbviewer/ web endpoint in METIS WIC devices is exposed without authentication. A remote attacker can access and export the internal telemetry SQLite database containing sensitive operational data. Additionally, the application is configured with debug mode enabled, causing malformed requests to return verbose Django tracebacks that disclose backend source code, local file paths, and system configuration. | |
| Title | Unauthenticated Data Export and Source Code Disclosure via /dbviewer/ in METIS WIC | |
| Weaknesses | CWE-215 CWE-284 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: MHV
Published:
Updated: 2026-02-11T15:02:05.830Z
Reserved: 2026-02-09T13:38:44.756Z
Link: CVE-2026-2250
Updated: 2026-02-11T15:01:58.575Z
Status : Awaiting Analysis
Published: 2026-02-11T15:16:17.760
Modified: 2026-02-11T15:27:26.370
Link: CVE-2026-2250
No data.
OpenCVE Enrichment
No data.