Skip to content

An exploit for an XSS and RCE vulnerability in the GoAhead webserver for embedded devices.

Notifications You must be signed in to change notification settings

0x1CA3/GoAhead-IPCAM-XSS-and-RCE

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 

Repository files navigation

GoAhead IPCAM Exploit

An exploit for an XSS vulnerability I found in the GoAhead webserver. I also decided to re-write and add an exploit for the RCE vulnerability that was discovered by other security researchers for this webserver.

Version

Details

Vulnerability Severity Description
Stored XSS 5/10 This vulnerability allows attackers to execute arbitrary javascript code on a victims browser.
Remote Code Execution 10/10 This vulnerability allows remote attackers to execute arbitrary system commands.

Setup

Steps for running exploit:
	cd bin
	./exploit
	

Steps for compiling (Make sure you have Vlang installed):
	v exploit.v
	./exploit

Credits

https://github.com/0x1CA3

Contributions 🎉

All contributions are accepted, simply open an Issue / Pull request.

About

An exploit for an XSS and RCE vulnerability in the GoAhead webserver for embedded devices.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages