From 2bc2224e2aab0ab0474c9713605a8fc4dfb0a5d4 Mon Sep 17 00:00:00 2001 From: Metasploit Date: Mon, 4 Mar 2019 16:36:26 -0800 Subject: [PATCH] automatic module_metadata_base.json update --- db/modules_metadata_base.json | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/db/modules_metadata_base.json b/db/modules_metadata_base.json index d3267290c4..2ba4cd3cd2 100644 --- a/db/modules_metadata_base.json +++ b/db/modules_metadata_base.json @@ -55174,7 +55174,8 @@ "type": "exploit", "author": [ "phikshun", - "wvu " + "wvu ", + "nstarke" ], "description": "This module exploits a command injection in the Belkin Wemo UPnP API via\n the SmartDevURL argument to the SetSmartDevInfo action.\n\n This module has been tested on a Wemo-enabled Crock-Pot, but other Wemo\n devices are known to be affected, albeit on a different RPORT (49153).", "references": [ @@ -55208,7 +55209,7 @@ "Unix In-Memory", "Linux Dropper" ], - "mod_time": "2019-02-22 13:22:54 +0000", + "mod_time": "2019-03-04 18:22:12 +0000", "path": "/modules/exploits/linux/upnp/belkin_wemo_upnp_exec.rb", "is_install_path": true, "ref_name": "linux/upnp/belkin_wemo_upnp_exec",