diff --git a/modules/exploits/linux/http/dlink_command_php_exec_noauth.rb b/modules/exploits/linux/http/dlink_command_php_exec_noauth.rb index 0d5f3bd55d..5a6e69f6c2 100644 --- a/modules/exploits/linux/http/dlink_command_php_exec_noauth.rb +++ b/modules/exploits/linux/http/dlink_command_php_exec_noauth.rb @@ -20,11 +20,10 @@ class Metasploit3 < Msf::Exploit::Remote Different D-Link Routers are vulnerable to OS command injection via the web interface. The vulnerability exists in command.php, which is accessible without authentication. This module has been tested with the versions DIR-600 2.14b01, - DIR-300 rev B 2.13. - Two target are included, first to start a telnetd service and establish a session over - it and second to run commands via the CMD target. There is no wget or tftp client to - upload an elf backdoor easily. - According to the vulnerability discoverer, more D-Link devices may affected. + DIR-300 rev B 2.13. Two target are included, the first one starts a telnetd service + and establish a session over it, the second one runs commands via the CMD target. + There is no wget or tftp client to upload an elf backdoor easily. According to the + vulnerability discoverer, more D-Link devices may affected. }, 'Author' => [