Sunday, May 4, 2025
HomeCVE/vulnerabilityGoAhead Servers Vulnerability Affected Hundreds of Thousands of IoT Devices

GoAhead Servers Vulnerability Affected Hundreds of Thousands of IoT Devices

Published on

SIEM as a Service

Follow Us on Google News

A critical vulnerability discovered in GoAhead Servers with versions running below 3.6.5 allows an attacker can exploit a remote code in GoAhead web Servers which affect thousands of IoT Devices.

GoAhead world’s most popular embedded Web Servers that are deployed in millions of devices including printers, IP phones, networking devices and many more.

Among a list of its clients, some of the famous ones are Avaya, Siemens, Canon, IBM, D-Links, Kodak, HP.

- Advertisement - Google News

The vulnerability can be tracked using CVE-2017-17562 and exits in the “CGI handler” function in all versions prior to 3.6.5.

Based on the Elttam report, The vulnerability is a result of Initialising the environment of forked CGI scripts using untrusted HTTP request parameters, and will affect all user’s who have CGI support enabled with dynamically linked executables (CGI scripts). This behavior, when combined with the glibc dynamic linker, can be abused for remote code execution using special variables such as LD_PRELOAD”.

This vulnerability provides the ability to the remote attacker to send malicious HTTP CGI request that can POST payload in the request and the exploitation could lead to an arbitrary code execution on the server.

Shodan search reveals a large number of devices (approx. more than 500,000) employing GoAhead server. So, as per now, a number of these could be vulnerable.

A patch has been released regarding the vulnerability and all the users have been advised to upgrade to GoAhead 3.6.5 if dynamically linked CGI programs are being used on Linux Machines.

Also Read: Hackers who created Dangerous Mirai IoT Botnet Plead Guilty

Elttam has also released POC that could be used to check if your GoAhead Servers version is prone to attack and to ensure security against the attack. The test scripts by Elttam can be found here.

With a large number of devices affected by this vulnerability, this seems to be a big trouble as a large pool of affected devices is now prone to malicious attackers.

Latest articles

Claude AI Abused in Influence-as-a-Service Operations and Campaigns

Claude AI, developed by Anthropic, has been exploited by malicious actors in a range...

Threat Actors Attacking U.S. Citizens Via Social Engineering Attack

As Tax Day on April 15 approaches, a alarming cybersecurity threat has emerged targeting...

TerraStealer Strikes: Browser Credential & Sensitive‑Data Heists on the Rise

Insikt Group has uncovered two new malware families, TerraStealerV2 and TerraLogger, attributed to the...

MintsLoader Malware Uses Sandbox and Virtual Machine Evasion Techniques

MintsLoader, a malicious loader first observed in 2024, has emerged as a formidable tool...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

CISA Issues New ICS Advisories Addressing Critical Vulnerabilities and Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) has issued two new advisories revealing critical...

CISA Issues Alert on Actively Exploited Apache HTTP Server Escape Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding a...

Netgear EX6200 Flaw Enables Remote Access and Data Theft

Security researchers have disclosed three critical vulnerabilities in the Netgear EX6200 Wi-Fi range extender...