Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://www.metis.tech/ |
|
Wed, 11 Feb 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Metis Cyberspace Technology Sa
Metis Cyberspace Technology Sa metis Wic |
|
| Vendors & Products |
Metis Cyberspace Technology Sa
Metis Cyberspace Technology Sa metis Wic |
Wed, 11 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 11 Feb 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | METIS WIC devices (versions <= oscore 2.1.234-r18) expose a web-based shell at the /console endpoint that does not require authentication. Accessing this endpoint allows a remote attacker to execute arbitrary operating system commands with root (UID 0) privileges. This results in full system compromise, allowing unauthorized access to modify system configuration, read sensitive data, or disrupt device operations | |
| Title | Unauthenticated Remote Root Shell Access via Web Console in METIS WIC | |
| Weaknesses | CWE-287 CWE-306 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: MHV
Published:
Updated: 2026-02-11T14:54:45.412Z
Reserved: 2026-02-09T13:38:41.942Z
Link: CVE-2026-2248
Updated: 2026-02-11T14:54:24.536Z
Status : Awaiting Analysis
Published: 2026-02-11T15:16:17.433
Modified: 2026-02-11T15:27:26.370
Link: CVE-2026-2248
No data.
OpenCVE Enrichment
Updated: 2026-02-11T21:38:07Z