From 748f2d3acd170da15613cfe86c5634fa1e0175a7 Mon Sep 17 00:00:00 2001 From: HD Moore Date: Fri, 24 Sep 2010 16:55:38 +0000 Subject: [PATCH] Make the title consistent with other modules git-svn-id: file:///home/svn/framework3/trunk@10457 4d416f70-5f16-0410-b530-b9f4589650da --- modules/exploits/linux/http/linksys_apply_cgi.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/exploits/linux/http/linksys_apply_cgi.rb b/modules/exploits/linux/http/linksys_apply_cgi.rb index 6cfcb6e695..f4c5ca8cd9 100644 --- a/modules/exploits/linux/http/linksys_apply_cgi.rb +++ b/modules/exploits/linux/http/linksys_apply_cgi.rb @@ -18,7 +18,7 @@ class Metasploit3 < Msf::Exploit::Remote def initialize(info = {}) super(update_info(info, - 'Name' => 'Linksys apply.cgi buffer overflow', + 'Name' => 'Linksys WRT54 Access Point apply.cgi Buffer Overflow', 'Description' => %q{ This module exploits a stack buffer overflow in apply.cgi on the Linksys WRT54G and WRT54GS routers. According to iDefense who discovered this vulnerability, all WRT54G versions prior to