GoAhead-IPCAM-XSS-and-RCE icon indicating copy to clipboard operation
GoAhead-IPCAM-XSS-and-RCE copied to clipboard

An exploit for an XSS and RCE vulnerability in the GoAhead webserver for embedded devices.

GoAhead IPCAM Exploit

An exploit for an XSS vulnerability I found in the GoAhead webserver. I also decided to re-write and add an exploit for the RCE vulnerability that was discovered by other security researchers for this webserver.

Version

Details

Vulnerability Severity Description
Stored XSS 5/10 This vulnerability allows attackers to execute arbitrary javascript code on a victims browser.
Remote Code Execution 10/10 This vulnerability allows remote attackers to execute arbitrary system commands.

Setup

Steps for running exploit:
	cd bin
	./exploit
	

Steps for compiling (Make sure you have Vlang installed):
	v exploit.v
	./exploit

Credits

https://github.com/0x1CA3

Contributions 🎉

All contributions are accepted, simply open an Issue / Pull request.