diff --git a/modules/exploits/linux/misc/sercomm_exec.rb b/modules/exploits/linux/misc/sercomm_exec.rb index 098262fde5..17a91d77df 100644 --- a/modules/exploits/linux/misc/sercomm_exec.rb +++ b/modules/exploits/linux/misc/sercomm_exec.rb @@ -59,8 +59,6 @@ class Metasploit3 < Msf::Exploit::Remote ], ['Cisco WAP4410N', { - # Note this target is little endian by network comm, but - # big endian file format. No idea why, but it works 'Arch' => ARCH_MIPSBE, 'PackFormat' => 'NNN', } @@ -80,8 +78,6 @@ class Metasploit3 < Msf::Exploit::Remote ], ['Netgear DG834G', { - # Note this target is big endian by network comm, but - # little endian file format. No idea why, but it works 'Arch' => ARCH_MIPSLE, 'PackFormat' => 'VVV', 'PayloadEncode' => 'octal' @@ -110,8 +106,6 @@ class Metasploit3 < Msf::Exploit::Remote ], ['Netgear WPNT834', { - # Note this target is little endian by network comm, but - # big endian file format. No idea why, but it works 'Arch' => ARCH_MIPSBE, 'PackFormat' => 'NNN', 'UploadPath' => '/var',