CVE-2024-29895

CRITICAL

CVSS v3

10

CRITICAL

EPSS Score

93.2%

exploit probability

CISA KEV

No

known exploited

Exploitation

SSVC status

Description

Cacti provides an operational monitoring and fault management framework. A command injection vulnerability on the 1.3.x DEV branch allows any unauthenticated user to execute arbitrary command on the server when `register_argc_argv` option of PHP is `On`. In `cmd_realtime.php` line 119, the `$poller_id` used as part of the command execution is sourced from `$_SERVER['argv']`, which can be controlled by URL when `register_argc_argv` option of PHP is `On`. And this option is `On` by default in many

Technical Details

CVSS v3 Vector
3.1
Published
5/14/2024
Last Modified
4/15/2026

Frequently Asked Questions

What is CVE-2024-29895?

Cacti provides an operational monitoring and fault management framework. A command injection vulnerability on the 1.3.x DEV branch allows any unauthenticated user to execute arbitrary command on the server when `register_argc_argv` option of PHP is `On`. In `cmd_realtime.php` line 119, the `$poller_id` used as part of the command execution is sourced from `$_SERVER['argv']`, which can be controlled by URL when `register_argc_argv` option of PHP is `On`. And this option is `On` by default in many

Is CVE-2024-29895 actively exploited?

Active exploitation of CVE-2024-29895 has not been confirmed. The EPSS score is 93.2%, indicating the estimated probability of exploitation in the next 30 days.

What is the CVSS score for CVE-2024-29895?

CVE-2024-29895 has a CVSS v3 base score of 10 (CRITICAL severity), with vector string 3.1.

Is CVE-2024-29895 affecting your environment?

Use isMalicious to check if any of your IPs or domains are associated with this vulnerability's IOCs.