CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds## Cacti RCE - CVE-2024-29895

## Usage:
`python3 cve-2024-29895.py -u https://target.com/ -c id`
Affecting Cacti versions 1.3.X on DEV builds where `cmd_realtime.php` is present and `POLLER_ID` is enabled.
Command Injection is possible via this endpoint, by requesting via GET with payload as HTML Query Parameters
## Dork:
Google: `inurl:cmd_realtime.php`
Shodan: `Cacti`
Hunter.how: `/product.name="Cacti"`
FOFA: `app="Cacti-Monitoring"`
## Version Checking

## Disclaimer
Please exercise caution when using this PoC. It has been strictly developed to serve as a tool automate the validation of the vulnerability.
Any misuse caused is at your own responsibility.
[4.0K] /data/pocs/724f28913ee8b8af75ead70733f8f106457a3398
├── [4.8K] CVE-2024-29895.py
└── [ 911] README.md
0 directories, 2 files