The /dbviewer/ web endpoint in METIS WIC devices is...
High severity
Unreviewed
Published
Feb 11, 2026
to the GitHub Advisory Database
•
Updated Feb 12, 2026
Description
Published by the National Vulnerability Database
Feb 11, 2026
Published to the GitHub Advisory Database
Feb 11, 2026
Last updated
Feb 12, 2026
The /dbviewer/ web endpoint in METIS WIC devices is exposed without authentication. A remote attacker can access and export the internal telemetry SQLite database containing sensitive operational data. Additionally, the application is configured with debug mode enabled, causing malformed requests to return verbose Django tracebacks that disclose backend source code, local file paths, and system configuration.
References