Fix descriptions and names
parent
232289d500
commit
d64c8748e8
|
@ -22,11 +22,9 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
Different D-Link Routers are vulnerable to OS command injection in the UPnP SOAP
|
Different D-Link Routers are vulnerable to OS command injection in the UPnP SOAP
|
||||||
interface. Since it is a blind OS command injection vulnerability, there is no
|
interface. Since it is a blind OS command injection vulnerability, there is no
|
||||||
output for the executed command when using the CMD target. Additionally, two targets
|
output for the executed command when using the CMD target. Additionally, a target
|
||||||
are included, to start a telnetd service and establish a session over it, or deploy a
|
to deploy a native mipsel payload, when wget is available on the target device, has
|
||||||
native mipsel payload. This module has been tested successfully on DIR-300, DIR-600,
|
been added. This module has been tested on DIR-865 and DIR-645 devices.
|
||||||
DIR-645, DIR-845 and DIR-865. According to the vulnerability discoverer,
|
|
||||||
more D-Link devices may affected.
|
|
||||||
},
|
},
|
||||||
'Author' =>
|
'Author' =>
|
||||||
[
|
[
|
||||||
|
|
|
@ -15,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
|
|
||||||
def initialize(info = {})
|
def initialize(info = {})
|
||||||
super(update_info(info,
|
super(update_info(info,
|
||||||
'Name' => 'D-Link Devices UPnP SOAP Command Execution',
|
'Name' => 'D-Link Devices UPnP SOAP Telnetd Command Execution',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
Different D-Link Routers are vulnerable to OS command injection in the UPnP SOAP
|
Different D-Link Routers are vulnerable to OS command injection in the UPnP SOAP
|
||||||
interface. This module has been tested successfully on DIR-300, DIR-600, DIR-645,
|
interface. This module has been tested successfully on DIR-300, DIR-600, DIR-645,
|
||||||
|
|
Loading…
Reference in New Issue