From c8123c147f6a0780f52719ccf79d21341a94052a Mon Sep 17 00:00:00 2001 From: m-1-k-3 Date: Tue, 5 May 2015 20:57:05 +0200 Subject: [PATCH] upnp vs hnap --- ...header_exec_noauth.rb => dlink_hnap_header_exec_noauth.rb} | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) rename modules/exploits/linux/http/{dlink_upnp_header_exec_noauth.rb => dlink_hnap_header_exec_noauth.rb} (97%) diff --git a/modules/exploits/linux/http/dlink_upnp_header_exec_noauth.rb b/modules/exploits/linux/http/dlink_hnap_header_exec_noauth.rb similarity index 97% rename from modules/exploits/linux/http/dlink_upnp_header_exec_noauth.rb rename to modules/exploits/linux/http/dlink_hnap_header_exec_noauth.rb index 5b57976022..0f001df572 100644 --- a/modules/exploits/linux/http/dlink_upnp_header_exec_noauth.rb +++ b/modules/exploits/linux/http/dlink_hnap_header_exec_noauth.rb @@ -13,9 +13,9 @@ class Metasploit3 < Msf::Exploit::Remote def initialize(info = {}) super(update_info(info, - 'Name' => 'D-Link Devices UPnP SOAPAction-Header Command Execution', + 'Name' => 'D-Link Devices HNAP SOAPAction-Header Command Execution', 'Description' => %q{ - Different D-Link Routers are vulnerable to OS command injection in the UPnP SOAP + Different D-Link Routers are vulnerable to OS command injection in the HNAP SOAP interface. Since it is a blind OS command injection vulnerability, there is no output for the executed command. This module has been tested on a DIR-645 device. The following devices are also reported as affected: DAP-1522 revB, DAP-1650 revB,