The /dbviewer/ web endpoint in METIS WIC devices is exposed without authentication. A remote attacker can access and export the internal telemetry SQLite database containing sensitive operational data. Additionally, the application is configured with debug mode enabled, causing malformed requests to return verbose Django tracebacks that disclose backend source code, local file paths, and system configuration.
References
Link Providers
https://www.metis.tech/ cve-icon cve-icon
History

Wed, 11 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Feb 2026 14:30:00 +0000

Type Values Removed Values Added
Description The /dbviewer/ web endpoint in METIS WIC devices is exposed without authentication. A remote attacker can access and export the internal telemetry SQLite database containing sensitive operational data. Additionally, the application is configured with debug mode enabled, causing malformed requests to return verbose Django tracebacks that disclose backend source code, local file paths, and system configuration.
Title Unauthenticated Data Export and Source Code Disclosure via /dbviewer/ in METIS WIC
Weaknesses CWE-215
CWE-284
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: MHV

Published:

Updated: 2026-02-11T15:02:05.830Z

Reserved: 2026-02-09T13:38:44.756Z

Link: CVE-2026-2250

cve-icon Vulnrichment

Updated: 2026-02-11T15:01:58.575Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-11T15:16:17.760

Modified: 2026-02-11T15:27:26.370

Link: CVE-2026-2250

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.