Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-22604 β€” AI Deep Analysis Summary

CVSS 9.1 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Cacti suffers from **OS Command Injection** via flawed SNMP result parsing. πŸ“‰ **Consequences**: Attackers can inject malformed OIDs to execute arbitrary system commands.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **CWE**: CWE-78 (OS Command Injection). πŸ” **Flaw**: The multi-line SNMP result parser is defective. It fails to sanitize inputs, allowing malicious payloads to slip through as valid SNMP responses.

Q3Who is affected? (Versions/Components)

🏒 **Vendor**: Cacti Team. πŸ“¦ **Product**: Cacti (Open-source network traffic monitoring tool). ⚠️ **Affected**: All versions prior to the fix. Uses SNMPget & RRDtool for data analysis.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Privileges**: The attacker gains the **same privileges** as the Cacti service account. πŸ“‚ **Data**: Can read/write any file accessible to that user.…

Q5Is exploitation threshold high? (Auth/Config)

πŸ” **Auth Required**: YES. βš–οΈ **Level**: High (PR:H). 🚫 **UI**: None required (UI:N). πŸ‘€ **User**: Must be an **authenticated user** within the Cacti application to trigger the injection via SNMP responses.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”“ **Exploit Available**: YES. πŸ“‚ **PoC**: Publicly available on GitHub (CVE-2025-22604-Cacti-RCE). 🌍 **Status**: Wild exploitation is possible since the proof-of-concept is live.

Q7How to self-check? (Features/Scanning)

πŸ” **Check**: Scan for Cacti instances. πŸ“‘ **Test**: Attempt to inject malformed OIDs in SNMP responses if you have valid credentials. πŸ“‹ **Verify**: Check if the system parses multi-line SNMP outputs without sanitization.

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed**: YES. πŸ“… **Date**: Published Jan 27, 2025. πŸ› οΈ **Patch**: Update Cacti to the latest version. πŸ”— **Ref**: See GitHub Security Advisory GHSA-c5j8-jxj3-hh36 for the official fix commit.

Q9What if no patch? (Workaround)

🚧 **Workaround**: If patching is delayed, restrict SNMP access strictly. πŸ”’ **Network**: Block external SNMP traffic. πŸ‘€ **Access Control**: Ensure only trusted, authenticated users can interact with SNMP modules.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Priority**: CRITICAL. πŸš€ **Urgency**: HIGH. πŸ“‰ **CVSS**: 9.8 (Critical). ⚑ **Action**: Patch immediately. The combination of RCE capability and public PoC makes this an immediate threat to any exposed Cacti instance.