VIAVIWEB Wallpaper Admin 1.0 contains an unauthenticated remote code execution vulnerability in the image upload functionality. Attackers can upload a malicious PHP file through the add_gallery_image.php endpoint to execute arbitrary code on the server.
References
| Link | Resource |
|---|---|
| https://www.exploit-db.com/exploits/51033 | Exploit Third Party Advisory VDB Entry |
| https://www.viaviweb.com | Product |
| https://www.vulncheck.com/advisories/viaviweb-wallpaper-admin-code-execution-via-image-upload | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-01-13 23:15
Updated : 2026-01-22 20:13
NVD link : CVE-2022-50893
Mitre link : CVE-2022-50893
CVE.ORG link : CVE-2022-50893
JSON object : View
Products Affected
viaviweb
- wallpaper_admin
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
