The remote host is running Cherokee - a fast and tiny web server. The remote version of this software is vulnerable to remote command execution due to a lack of web requests sanitization, especially shell metacharacters. Additionally, this version fails to drop root privileges after it binds to listen port. A remote attacker may submit a specially crafted web request to execute arbitrary command on the server with root privileges.
Upgrade to Cherokee 0.2.7 or newer