diff --git a/modules/exploits/linux/http/linksys_e1500_up_exec.rb b/modules/exploits/linux/http/linksys_e1500_up_exec.rb index 76a315063f..1d782780cf 100644 --- a/modules/exploits/linux/http/linksys_e1500_up_exec.rb +++ b/modules/exploits/linux/http/linksys_e1500_up_exec.rb @@ -21,7 +21,9 @@ class Metasploit3 < Msf::Exploit::Remote 'Description' => %q{ This module can be used to execute a payload on Linksys Routers }, - 'Author' => [ 'Michael Messner '], + 'Author' => [ 'Michael Messner ', + 'juan vazquez' # minor help + ], 'License' => MSF_LICENSE, 'References' => [ @@ -33,7 +35,6 @@ class Metasploit3 < Msf::Exploit::Remote 'DisclosureDate' => 'Feb 05 2013', 'Privileged' => true, 'Platform' => ['linux','unix'], - #'Arch' => ARCH_MIPSLE, 'Payload' => { 'DisableNops' => true