The /dbviewer/ web endpoint in METIS WIC devices is exposed without authentication. A remote attacker can access and export the internal telemetry SQLite database containing sensitive operational data. Additionally, the application is configured with debug mode enabled, causing malformed requests to return verbose Django tracebacks that disclose backend source code, local file paths, and system configuration.
References
Configurations
No configuration.
History
12 Feb 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
11 Feb 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-11 15:16
Updated : 2026-02-12 16:16
NVD link : CVE-2026-2250
Mitre link : CVE-2026-2250
CVE.ORG link : CVE-2026-2250
JSON object : View
Products Affected
No product.
