Share
## https://sploitus.com/exploit?id=D9E02A00-8B79-5B5B-ACF3-2E9664E1F6E4
# CVE-2023-2868: Barracuda ESG Command Injection 

For full details, read our [AttackerKB Analysis](https://attackerkb.com/topics/2Z0CWopGPX/cve-2023-2868/rapid7-analysis). 

## Usage
Set LHOST and RHOST variables to your listener.

```ruby poc_cve_2023_2868.rb <TARGET_IP>```

This will spawn a reverse shell.