The /dbviewer/ web endpoint in METIS WIC devices is exposed without authentication. A remote attacker can access and export the internal telemetry SQLite database containing sensitive operational data. Additionally, the application is configured with debug mode enabled, causing malformed requests to return verbose Django tracebacks that disclose backend source code, local file paths, and system configuration.
References
Link Providers
https://www.metis.tech/ cve-icon cve-icon
History

Wed, 11 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
First Time appeared Metis Cyberspace Technology Sa
Metis Cyberspace Technology Sa metis Wic
Vendors & Products Metis Cyberspace Technology Sa
Metis Cyberspace Technology Sa metis Wic

Wed, 11 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Feb 2026 14:30:00 +0000

Type Values Removed Values Added
Description The /dbviewer/ web endpoint in METIS WIC devices is exposed without authentication. A remote attacker can access and export the internal telemetry SQLite database containing sensitive operational data. Additionally, the application is configured with debug mode enabled, causing malformed requests to return verbose Django tracebacks that disclose backend source code, local file paths, and system configuration.
Title Unauthenticated Data Export and Source Code Disclosure via /dbviewer/ in METIS WIC
Weaknesses CWE-215
CWE-284
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: MHV

Published: 2026-02-11T14:13:45.892Z

Updated: 2026-02-11T15:02:05.830Z

Reserved: 2026-02-09T13:38:44.756Z

Link: CVE-2026-2250

cve-icon Vulnrichment

Updated: 2026-02-11T15:01:58.575Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-11T15:16:17.760

Modified: 2026-02-11T15:27:26.370

Link: CVE-2026-2250

cve-icon Redhat

No data.