Title change for dlink_dir300_exec_telnet

Title change for dlink_dir300_exec_telnet. Also correct the email
format.
bug/bundler_fix
sinn3r 2013-08-09 15:41:50 -05:00
parent 4558aca7ca
commit 5436ec7dd3
1 changed files with 2 additions and 2 deletions

View File

@ -15,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info = {})
super(update_info(info,
'Name' => 'D-Link Devices Unauthenticated Remote Command Execution',
'Name' => 'D-Link Devices Authenticated Remote Command Execution',
'Description' => %q{
Different D-Link Routers are vulnerable to OS command injection via the web
interface. The vulnerability exists in tools_vct.xgi, which is accessible with
@ -27,7 +27,7 @@ class Metasploit3 < Msf::Exploit::Remote
},
'Author' =>
[
'Michael Messner <devnull@s3cur1ty.de>', # Vulnerability discovery and Metasploit module
'Michael Messner <devnull[at]s3cur1ty.de>', # Vulnerability discovery and Metasploit module
'juan vazquez' # minor help with msf module
],
'License' => MSF_LICENSE,