Description
The /dbviewer/ web endpoint in METIS WIC devices is exposed without authentication. A remote attacker can access and export the internal telemetry SQLite database containing sensitive operational data. Additionally, the application is configured with debug mode enabled, causing malformed requests to return verbose Django tracebacks that disclose backend source code, local file paths, and system configuration.
Published: 2026-02-11
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthenticated Data Export and Source Code Disclosure
Action: Disable Debug
AI Analysis

Impact

The /dbviewer/ web endpoint in METIS WIC devices is accessible without authentication, enabling a remote attacker to retrieve the internal telemetry SQLite database that contains sensitive operational data. Furthermore, the application is running with debug mode enabled, so malformed requests trigger verbose Django tracebacks that expose backend source code, local file paths, and system configuration. These details map to CWE-215 (Information Exposure Through Log Chain) and CWE-284 (Improper Access Control).

Affected Systems

The vulnerability affects METIS Cyberspace Technology SA’s METIS WIC product. Vendor and product information is available, but specific affected firmware or build versions are not disclosed in the data. All deployments that expose the /dbviewer/ endpoint without proper authentication or that enable debug mode are potentially impacted.

Risk and Exploitability

The CVSS score of 7.5 indicates a high severity, while the EPSS score of less than 1% suggests a low but non‑zero likelihood of exploitation at the time of analysis. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. The likely attack vector is remote over the network, requiring no authentication or credentials. An attacker can simply hit the exposed endpoint from any network location and download the telemetry database or trigger tracebacks. The lack of authentication and debug mode make this straightforward for attackers with network access.

Generated by OpenCVE AI on April 17, 2026 at 20:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Deactivate Django debug mode or set DEBUG=False in the application configuration.
  • Apply authentication or authorization controls to the /dbviewer/ endpoint, ensuring only authorized users can access the database export feature.
  • Limit exposure of the /dbviewer/ URL to trusted networks or implement firewall rules that block external access.
  • Check with METIS for firmware updates or official patches that address this issue and apply them promptly.

Generated by OpenCVE AI on April 17, 2026 at 20:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 12 Feb 2026 15:30:00 +0000


Wed, 11 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
First Time appeared Metis Cyberspace Technology Sa
Metis Cyberspace Technology Sa metis Wic
Vendors & Products Metis Cyberspace Technology Sa
Metis Cyberspace Technology Sa metis Wic

Wed, 11 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Feb 2026 14:30:00 +0000

Type Values Removed Values Added
Description The /dbviewer/ web endpoint in METIS WIC devices is exposed without authentication. A remote attacker can access and export the internal telemetry SQLite database containing sensitive operational data. Additionally, the application is configured with debug mode enabled, causing malformed requests to return verbose Django tracebacks that disclose backend source code, local file paths, and system configuration.
Title Unauthenticated Data Export and Source Code Disclosure via /dbviewer/ in METIS WIC
Weaknesses CWE-215
CWE-284
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Metis Cyberspace Technology Sa Metis Wic
cve-icon MITRE

Status: PUBLISHED

Assigner: MHV

Published:

Updated: 2026-02-12T15:20:51.492Z

Reserved: 2026-02-09T13:38:44.756Z

Link: CVE-2026-2250

cve-icon Vulnrichment

Updated: 2026-02-11T15:01:58.575Z

cve-icon NVD

Status : Deferred

Published: 2026-02-11T15:16:17.760

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-2250

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T20:30:15Z

Weaknesses