## https://sploitus.com/exploit?id=D9E02A00-8B79-5B5B-ACF3-2E9664E1F6E4
# CVE-2023-2868: Barracuda ESG Command Injection
For full details, read our [AttackerKB Analysis](https://attackerkb.com/topics/2Z0CWopGPX/cve-2023-2868/rapid7-analysis).
## Usage
Set LHOST and RHOST variables to your listener.
```ruby poc_cve_2023_2868.rb <TARGET_IP>```
This will spawn a reverse shell.