From 5436ec7dd30135d47ff446d296f969b90ffc8c2a Mon Sep 17 00:00:00 2001 From: sinn3r Date: Fri, 9 Aug 2013 15:41:50 -0500 Subject: [PATCH] Title change for dlink_dir300_exec_telnet Title change for dlink_dir300_exec_telnet. Also correct the email format. --- modules/exploits/linux/http/dlink_dir300_exec_telnet.rb | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/modules/exploits/linux/http/dlink_dir300_exec_telnet.rb b/modules/exploits/linux/http/dlink_dir300_exec_telnet.rb index caf290e598..4177c7312b 100644 --- a/modules/exploits/linux/http/dlink_dir300_exec_telnet.rb +++ b/modules/exploits/linux/http/dlink_dir300_exec_telnet.rb @@ -15,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Remote def initialize(info = {}) super(update_info(info, - 'Name' => 'D-Link Devices Unauthenticated Remote Command Execution', + 'Name' => 'D-Link Devices Authenticated Remote Command Execution', 'Description' => %q{ Different D-Link Routers are vulnerable to OS command injection via the web interface. The vulnerability exists in tools_vct.xgi, which is accessible with @@ -27,7 +27,7 @@ class Metasploit3 < Msf::Exploit::Remote }, 'Author' => [ - 'Michael Messner ', # Vulnerability discovery and Metasploit module + 'Michael Messner ', # Vulnerability discovery and Metasploit module 'juan vazquez' # minor help with msf module ], 'License' => MSF_LICENSE,