From 21b220321f797ec60a9bb344d2717e4cf0f0b837 Mon Sep 17 00:00:00 2001 From: Jeff Jarmoc Date: Mon, 7 Apr 2014 18:06:59 -0500 Subject: [PATCH] Fix typo. This isn't a Linksys exploit. Left over wording from a previous exploit? --- modules/exploits/linux/smtp/exim4_dovecot_exec.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/exploits/linux/smtp/exim4_dovecot_exec.rb b/modules/exploits/linux/smtp/exim4_dovecot_exec.rb index 3e65911f6e..9215b121f2 100644 --- a/modules/exploits/linux/smtp/exim4_dovecot_exec.rb +++ b/modules/exploits/linux/smtp/exim4_dovecot_exec.rb @@ -209,7 +209,7 @@ class Metasploit3 < Msf::Exploit::Remote # wait for payload download if (datastore['DOWNHOST']) - print_status("#{rhost}:#{rport} - Giving #{datastore['HTTP_DELAY']} seconds to the Linksys device to download the payload") + print_status("#{rhost}:#{rport} - Giving #{datastore['HTTP_DELAY']} seconds to the target to download the payload") select(nil, nil, nil, datastore['HTTP_DELAY']) else wait_linux_payload