Skip to content

0x1CA3/GoAhead-IPCAM-XSS-and-RCE

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

8 Commits
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 

Repository files navigation

GoAhead IPCAM Exploit

An exploit for an XSS vulnerability I found in the GoAhead webserver. I also decided to re-write and add an exploit for the RCE vulnerability that was discovered by other security researchers for this webserver.

Version

Details

Vulnerability Severity Description
Stored XSS 5/10 This vulnerability allows attackers to execute arbitrary javascript code on a victims browser.
Remote Code Execution 10/10 This vulnerability allows remote attackers to execute arbitrary system commands.

Setup

Steps for running exploit:
	cd bin
	./exploit
	

Steps for compiling (Make sure you have Vlang installed):
	v exploit.v
	./exploit

Credits

https://github.com/0x1CA3

Contributions ๐ŸŽ‰

All contributions are accepted, simply open an Issue / Pull request.

About

An exploit for an XSS and RCE vulnerability in the GoAhead webserver for embedded devices.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages