Fix descriptions and names

bug/bundler_fix
jvazquez-r7 2013-08-19 15:05:27 -05:00
parent 232289d500
commit d64c8748e8
2 changed files with 4 additions and 6 deletions

View File

@ -22,11 +22,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Description' => %q{
Different D-Link Routers are vulnerable to OS command injection in the UPnP SOAP
interface. Since it is a blind OS command injection vulnerability, there is no
output for the executed command when using the CMD target. Additionally, two targets
are included, to start a telnetd service and establish a session over it, or deploy a
native mipsel payload. This module has been tested successfully on DIR-300, DIR-600,
DIR-645, DIR-845 and DIR-865. According to the vulnerability discoverer,
more D-Link devices may affected.
output for the executed command when using the CMD target. Additionally, a target
to deploy a native mipsel payload, when wget is available on the target device, has
been added. This module has been tested on DIR-865 and DIR-645 devices.
},
'Author' =>
[

View File

@ -15,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info = {})
super(update_info(info,
'Name' => 'D-Link Devices UPnP SOAP Command Execution',
'Name' => 'D-Link Devices UPnP SOAP Telnetd Command Execution',
'Description' => %q{
Different D-Link Routers are vulnerable to OS command injection in the UPnP SOAP
interface. This module has been tested successfully on DIR-300, DIR-600, DIR-645,