VIAVIWEB Wallpaper Admin 1.0 contains a SQL injection vulnerability that allows attackers to bypass authentication by manipulating login credentials. Attackers can exploit the login page by injecting 'admin' or 1=1-- - payload to gain unauthorized access to the administrative interface.
References
| Link | Resource |
|---|---|
| https://www.exploit-db.com/exploits/51033 | Exploit VDB Entry |
| https://www.viaviweb.com | Product |
| https://www.vulncheck.com/advisories/viaviweb-wallpaper-admin-sql-injection-via-login-page | Third Party Advisory |
Configurations
History
22 Jan 2026, 20:19
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Viaviweb
Viaviweb wallpaper Admin |
|
| References | () https://www.exploit-db.com/exploits/51033 - Exploit, VDB Entry | |
| References | () https://www.viaviweb.com - Product | |
| References | () https://www.vulncheck.com/advisories/viaviweb-wallpaper-admin-sql-injection-via-login-page - Third Party Advisory | |
| CPE | cpe:2.3:a:viaviweb:wallpaper_admin:1.0:*:*:*:*:*:*:* |
13 Jan 2026, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-13 23:15
Updated : 2026-01-22 20:19
NVD link : CVE-2022-50892
Mitre link : CVE-2022-50892
CVE.ORG link : CVE-2022-50892
JSON object : View
Products Affected
viaviweb
- wallpaper_admin
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
