diff --git a/modules/auxiliary/scanner/http/linksys_traversal.rb b/modules/auxiliary/scanner/http/linksys_traversal.rb index c59f1543e1..f370dc8a8d 100644 --- a/modules/auxiliary/scanner/http/linksys_traversal.rb +++ b/modules/auxiliary/scanner/http/linksys_traversal.rb @@ -71,7 +71,7 @@ class Metasploit3 < Msf::Auxiliary }) #without res.body.length we get lots of false positives - if (res and res.code == 200 and res.body.length > 10) + if (res and res.code == 200 and res.body.length > 0) print_good("#{rhost}:#{rport} - Request may have succeeded on file #{file}") report_web_vuln({ :host => rhost,