Vulnerabilities in Goodmill Systems w24e and w24h routers

Three privilege escalation vulnerabilities have been found from the firmware on Goodmill Systems w24e and w24h routers. A logged in user could unauthorizedly expand the user privileges in routers affected by the vulnerabilities. Goodmill Systems has released a new version of the firmware addressing the vulnerabilities.

An user account for administrative purposes has been removed from the firmware. The "remote_user" account used hardcoded credentials. Goodmill Systems is a Finnish company whose connectivity products are used for example in vehicles. Please contact the vendor for more information about the update process.

Vulnerability coordination:

The vulnerability was found by Antti Tönkyrä, Mika Järvinen, Mikko Kenttälä and Ossi Salmi. NCSC-FI would like to thank the finders and the vendor for participating in the coordination.

  • Servers and server applications
  • Workstations and end-user applications
  • Network devices
  • Mobile communications systems
  • Embedded systems
  • Others


  • Network devices
Further information +

Attack vector

  • Locally
  • Remote
Further information on the access vector +


  • Expansion of access rights
  • Security bypass
Further information on the impact +


  • Software update patch
  • Restriction of the problem
Further information on the remediation +

Vulnerable software:

  • w24e SW versions 4.0.3.x, 4.0.4, 4.0.5.x , 4.0.6.x before the version
  • w24h SW versions before version

Possible solutions and restrictive measures:

The vendor recommends customers to upgrade the software in their routers to the following versions in order to patch these vulnerabilities and to be at the latest software levels:

  • (routers w24e/w24e-S/w24)
  • (routers w24h-S/w24h-I).

Contact Information

NCSC-FI Vulnerability Coordination can be contacted as follows:


Please quote the advisory reference [FICORA #1038870] in the subject line.


+358 295 390 230

Monday - Friday 08:00 – 16:15 (EET: UTC+3)


Vulnerability Coordination


P.O. Box 313

FI-00561 Helsinki


NCSC-FI encourages those who wish to communicate via email to make use of our PGP key. The PGP key as well as the vulnerability coordination principles of NCSC-FI are available at:

Further information:

Update history

Key words: Information security , NCSC-FI , Vulnerability coordination , Vulnerabilities

LinkedIn Print


The Finnish Communications Regulatory Authority (FICORA)

The National Cyber Security Centre Finland (NCSC-FI)

Itämerenkatu 3 A

P.O. Box 313


Media contacts by telephone +358 295 390 248