automatic module_metadata_base.json update
parent
cdc0728c44
commit
3ccbaee0b1
|
@ -7312,6 +7312,58 @@
|
|||
"notes": {
|
||||
}
|
||||
},
|
||||
"auxiliary_admin/wemo/crockpot": {
|
||||
"name": "Belkin Wemo-Enabled Crock-Pot Remote Control",
|
||||
"full_name": "auxiliary/admin/wemo/crockpot",
|
||||
"rank": 300,
|
||||
"disclosure_date": null,
|
||||
"type": "auxiliary",
|
||||
"author": [
|
||||
"wvu <wvu@metasploit.com>"
|
||||
],
|
||||
"description": "This module acts as a simple remote control for Belkin Wemo-enabled\n Crock-Pots by implementing a subset of the functionality provided by the\n Wemo App.\n\n No vulnerabilities are exploited by this Metasploit module in any way.",
|
||||
"references": [
|
||||
"URL-https://www.crock-pot.com/wemo-landing-page.html",
|
||||
"URL-https://www.belkin.com/us/support-article?articleNum=101177",
|
||||
"URL-http://www.wemo.com/"
|
||||
],
|
||||
"is_server": false,
|
||||
"is_client": false,
|
||||
"platform": "",
|
||||
"arch": "",
|
||||
"rport": 49152,
|
||||
"autofilter_ports": [
|
||||
80,
|
||||
8080,
|
||||
443,
|
||||
8000,
|
||||
8888,
|
||||
8880,
|
||||
8008,
|
||||
3000,
|
||||
8443
|
||||
],
|
||||
"autofilter_services": [
|
||||
"http",
|
||||
"https"
|
||||
],
|
||||
"targets": null,
|
||||
"mod_time": "2019-02-12 13:29:52 +0000",
|
||||
"path": "/modules/auxiliary/admin/wemo/crockpot.rb",
|
||||
"is_install_path": true,
|
||||
"ref_name": "admin/wemo/crockpot",
|
||||
"check": true,
|
||||
"post_auth": false,
|
||||
"default_credential": false,
|
||||
"notes": {
|
||||
"Stability": [
|
||||
"crash-safe"
|
||||
],
|
||||
"SideEffects": [
|
||||
"physical-effects"
|
||||
]
|
||||
}
|
||||
},
|
||||
"auxiliary_admin/zend/java_bridge": {
|
||||
"name": "Zend Server Java Bridge Design Flaw Remote Code Execution",
|
||||
"full_name": "auxiliary/admin/zend/java_bridge",
|
||||
|
|
Loading…
Reference in New Issue