From 3b386f86f6339b469be4692a54784b1004bf4842 Mon Sep 17 00:00:00 2001 From: aushack Date: Tue, 14 Feb 2017 17:05:46 +1100 Subject: [PATCH] Typo fix. --- modules/auxiliary/gather/netgear_password_disclosure.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/auxiliary/gather/netgear_password_disclosure.rb b/modules/auxiliary/gather/netgear_password_disclosure.rb index eb3ef6f024..0be849fa98 100644 --- a/modules/auxiliary/gather/netgear_password_disclosure.rb +++ b/modules/auxiliary/gather/netgear_password_disclosure.rb @@ -15,7 +15,7 @@ class MetasploitModule < Msf::Auxiliary 'Description' => %q{ This module will collect the password for the `admin` user. The exploit will not complete if password recovery is set on the router. - The password is recieved by passing the token generated from `unauth.cgi` + The password is received by passing the token generated from `unauth.cgi` to `passwordrecovered.cgi`. This exploit works on many different NETGEAR products. The full list of affected products is available in the 'References' section.