CVE-2020-8813
HIGH EXPLOITED IN THE WILD NUCLEICacti 1.2.8 - Command Injection
Title source: llmDescription
graph_realtime.php in Cacti 1.2.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in a cookie, if a guest user has the graph real-time privilege.
Exploits (6)
nomisec
WORKING POC
7 stars
by p0dalirius · remote-auth
https://github.com/p0dalirius/CVE-2020-8813-Cacti-RCE-in-graph_realtime
Nuclei Templates (1)
Cacti v1.2.8 - Remote Code Execution
HIGHby gy741
Shodan:
http.title:"login to cacti" || http.title:"cacti" || http.favicon.hash:"-1797138069"
FOFA:
icon_hash="-1797138069" || title="cacti" || title="login to cacti"
References (16)
Scores
CVSS v3
8.8
EPSS
0.9393
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2021-09-11
InTheWild.io
2021-04-18
CWE
CWE-78
Status
published
Products (7)
cacti/cacti
1.2.8
debian/debian_linux
10.0
fedoraproject/fedora
30
fedoraproject/fedora
31
fedoraproject/fedora
32
opensuse/suse_package_hub
opmantek/open-audit
3.3.1
Published
Feb 22, 2020
Tracked Since
Feb 18, 2026