Cacti v1.2.8 Unauthenticated Remote Code Execution# CVE-2020-8813
Cacti v1.2.8 Unauthenticated Remote Code Execution
**Uses Python 3**
Running without Docker:
```bash
git clone https://github.com/hexcowboy/CVE-2020-8813.git && cd CVE-2020-8813
python3 -m venv env && source env/bin/activate
pip install -r requirements.txt
python exploit.py
```
Running with Docker:
```bash
git clone https://github.com/hexcowboy/CVE-2020-8813.git && cd CVE-2020-8813
docker build -t cve-2020-8813 .
docker run -it cve-2020-8813
```
[4.0K] /data/pocs/9a90bdfd673de3cfdec53a416e4ed03c45af5157
├── [ 140] Dockerfile
├── [1.4K] exploit.py
├── [1.0K] LICENSE
├── [ 470] README.md
└── [ 187] requirements.txt
0 directories, 5 files