VIAVIWEB Wallpaper Admin 1.0 contains a SQL injection vulnerability that allows attackers to bypass authentication by manipulating login credentials. Attackers can exploit the login page by injecting 'admin' or 1=1-- - payload to gain unauthorized access to the administrative interface.
References
| Link | Resource |
|---|---|
| https://www.exploit-db.com/exploits/51033 | Exploit VDB Entry |
| https://www.viaviweb.com | Product |
| https://www.vulncheck.com/advisories/viaviweb-wallpaper-admin-sql-injection-via-login-page | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-01-13 23:15
Updated : 2026-01-22 20:19
NVD link : CVE-2022-50892
Mitre link : CVE-2022-50892
CVE.ORG link : CVE-2022-50892
JSON object : View
Products Affected
viaviweb
- wallpaper_admin
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
