CVE-2025-22604

CRITICAL
2025-01-27 [email protected]
9.1
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 28, 2026 - 18:05 vuln.today
Patch Released
Mar 28, 2026 - 18:05 nvd
Patch available
PoC Detected
Nov 03, 2025 - 21:19 vuln.today
Public exploit code
CVE Published
Jan 27, 2025 - 17:15 nvd
CRITICAL 9.1

Description

Cacti is an open source performance and fault management framework. Due to a flaw in multi-line SNMP result parser, authenticated users can inject malformed OIDs in the response. When processed by ss_net_snmp_disk_io() or ss_net_snmp_disk_bytes(), a part of each OID will be used as a key in an array that is used as part of a system command, causing a command execution vulnerability. This vulnerability is fixed in 1.2.29.

Analysis

Cacti versions prior to 1.2.29 contain an authenticated command injection through the SNMP result parser. By injecting malformed OIDs into SNMP responses, authenticated users can execute arbitrary system commands when the results are processed by the ss_net_snmp_disk_io() or ss_net_snmp_disk_bytes() functions.

Technical Context

Cacti's SNMP poller parses multi-line results where parts of each OID are used as array keys that end up in system command strings. An authenticated user who can influence SNMP responses (through a compromised device or SNMP proxy) can inject crafted OIDs containing shell metacharacters. When processed by ss_net_snmp_disk_io() or ss_net_snmp_disk_bytes(), the malicious OID component is executed as a system command.

Affected Products

['Cacti < 1.2.29']

Remediation

Update to Cacti 1.2.29 or later. Restrict device management permissions to trusted administrators. Validate SNMP response data before shell processing. Implement network segmentation between the monitoring server and monitored devices.

Priority Score

138
Low Medium High Critical
KEV: 0
EPSS: +72.2
CVSS: +46
POC: +20

Vendor Status

Share

CVE-2025-22604 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy