Title change for dlink_dir300_exec_telnet

Title change for dlink_dir300_exec_telnet. Also correct the email
format.
bug/bundler_fix
sinn3r 2013-08-09 15:41:50 -05:00
parent 4558aca7ca
commit 5436ec7dd3
1 changed files with 2 additions and 2 deletions

View File

@ -15,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info = {}) def initialize(info = {})
super(update_info(info, super(update_info(info,
'Name' => 'D-Link Devices Unauthenticated Remote Command Execution', 'Name' => 'D-Link Devices Authenticated Remote Command Execution',
'Description' => %q{ 'Description' => %q{
Different D-Link Routers are vulnerable to OS command injection via the web Different D-Link Routers are vulnerable to OS command injection via the web
interface. The vulnerability exists in tools_vct.xgi, which is accessible with interface. The vulnerability exists in tools_vct.xgi, which is accessible with
@ -27,7 +27,7 @@ class Metasploit3 < Msf::Exploit::Remote
}, },
'Author' => 'Author' =>
[ [
'Michael Messner <devnull@s3cur1ty.de>', # Vulnerability discovery and Metasploit module 'Michael Messner <devnull[at]s3cur1ty.de>', # Vulnerability discovery and Metasploit module
'juan vazquez' # minor help with msf module 'juan vazquez' # minor help with msf module
], ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,