CVE-2026-2250
Awaiting Analysis Awaiting Analysis - Queue
Unauthorized Access and Information Disclosure in METIS WIC /dbviewer Endpoint

Publication date: 2026-02-11

Last updated on: 2026-02-12

Assigner: MHV

Description
The /dbviewer/ web endpoint in METIS WIC devices is exposed without authentication. A remote attacker can access and export the internal telemetry SQLite database containing sensitive operational data. Additionally, the application is configured with debug mode enabled, causing malformed requests to return verbose Django tracebacks that disclose backend source code, local file paths, and system configuration.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-11
Last Modified
2026-02-12
Generated
2026-05-07
AI Q&A
2026-02-11
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
metis wireless_intelligent_collector to 2.1.235-r19 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-215 The product inserts sensitive information into debugging code, which could expose this information if the debugging code is not disabled in production.
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The vulnerability exists in the /dbviewer/ web endpoint of METIS WIC devices, which is accessible without any authentication. This allows a remote attacker to access and export the internal telemetry SQLite database that contains sensitive operational data.

Additionally, the application is running in debug mode, which causes malformed requests to return detailed Django tracebacks. These tracebacks reveal backend source code, local file paths, and system configuration information.


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized disclosure of sensitive operational data stored in the telemetry SQLite database.

The exposure of detailed debug information such as backend source code, file paths, and system configuration can aid attackers in further exploiting the system or understanding its internal workings.

Overall, this can compromise the confidentiality of the device's data and potentially facilitate further attacks.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart