VIAVIWEB Wallpaper Admin 1.0 contains an unauthenticated remote code execution vulnerability in the image upload functionality. Attackers can upload a malicious PHP file through the add_gallery_image.php endpoint to execute arbitrary code on the server.
References
| Link | Resource |
|---|---|
| https://www.exploit-db.com/exploits/51033 | Exploit Third Party Advisory VDB Entry |
| https://www.viaviweb.com | Product |
| https://www.vulncheck.com/advisories/viaviweb-wallpaper-admin-code-execution-via-image-upload | Third Party Advisory |
Configurations
History
22 Jan 2026, 20:13
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.exploit-db.com/exploits/51033 - Exploit, Third Party Advisory, VDB Entry | |
| References | () https://www.viaviweb.com - Product | |
| References | () https://www.vulncheck.com/advisories/viaviweb-wallpaper-admin-code-execution-via-image-upload - Third Party Advisory | |
| CPE | cpe:2.3:a:viaviweb:wallpaper_admin:1.0:*:*:*:*:*:*:* | |
| First Time |
Viaviweb
Viaviweb wallpaper Admin |
13 Jan 2026, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-13 23:15
Updated : 2026-01-22 20:13
NVD link : CVE-2022-50893
Mitre link : CVE-2022-50893
CVE.ORG link : CVE-2022-50893
JSON object : View
Products Affected
viaviweb
- wallpaper_admin
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
