CVE-2020-8813

HIGH EXPLOITED IN THE WILD NUCLEI

Cacti 1.2.8 - Command Injection

Title source: llm

Description

graph_realtime.php in Cacti 1.2.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in a cookie, if a guest user has the graph real-time privilege.

Exploits (6)

exploitdb WORKING POC
by Askar · pythonwebappsmultiple
https://www.exploit-db.com/exploits/48145
exploitdb WORKING POC
by Askar · pythonwebappsmultiple
https://www.exploit-db.com/exploits/48144
nomisec WORKING POC 68 stars
by mhaskar · poc
https://github.com/mhaskar/CVE-2020-8813
nomisec WORKING POC 7 stars
by p0dalirius · remote-auth
https://github.com/p0dalirius/CVE-2020-8813-Cacti-RCE-in-graph_realtime
nomisec WORKING POC 1 stars
by hexcowboy · remote
https://github.com/hexcowboy/CVE-2020-8813
nomisec WORKING POC 1 stars
by 0xm4ud · remote
https://github.com/0xm4ud/Cacti-CVE-2020-8813

Nuclei Templates (1)

Cacti v1.2.8 - Remote Code Execution
HIGHby gy741
Shodan: http.title:"login to cacti" || http.title:"cacti" || http.favicon.hash:"-1797138069"
FOFA: icon_hash="-1797138069" || title="cacti" || title="login to cacti"

References (16)

Scores

CVSS v3 8.8
EPSS 0.9393
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2021-09-11
InTheWild.io 2021-04-18
CWE
CWE-78
Status published
Products (7)
cacti/cacti 1.2.8
debian/debian_linux 10.0
fedoraproject/fedora 30
fedoraproject/fedora 31
fedoraproject/fedora 32
opensuse/suse_package_hub
opmantek/open-audit 3.3.1
Published Feb 22, 2020
Tracked Since Feb 18, 2026