CVE-2026-2250

The /dbviewer/ web endpoint in METIS WIC devices is exposed without authentication. A remote attacker can access and export the internal telemetry SQLite database containing sensitive operational data. Additionally, the application is configured with debug mode enabled, causing malformed requests to return verbose Django tracebacks that disclose backend source code, local file paths, and system configuration.
Configurations

No configuration.

History

12 Feb 2026, 16:16

Type Values Removed Values Added
References
  • () https://cydome.io/vulnerability-advisory-cve-2026-2250-unauthenticated-data-exfilteration-and-information-disclosure-in-metis-wic-wireless-intelligent-collector -

11 Feb 2026, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-11 15:16

Updated : 2026-02-12 16:16


NVD link : CVE-2026-2250

Mitre link : CVE-2026-2250

CVE.ORG link : CVE-2026-2250


JSON object : View

Products Affected

No product.

CWE
CWE-215

Insertion of Sensitive Information Into Debugging Code

CWE-284

Improper Access Control