Fix descriptions and names

bug/bundler_fix
jvazquez-r7 2013-08-19 15:05:27 -05:00
parent 232289d500
commit d64c8748e8
2 changed files with 4 additions and 6 deletions

View File

@ -22,11 +22,9 @@ class Metasploit3 < Msf::Exploit::Remote
'Description' => %q{ 'Description' => %q{
Different D-Link Routers are vulnerable to OS command injection in the UPnP SOAP Different D-Link Routers are vulnerable to OS command injection in the UPnP SOAP
interface. Since it is a blind OS command injection vulnerability, there is no interface. Since it is a blind OS command injection vulnerability, there is no
output for the executed command when using the CMD target. Additionally, two targets output for the executed command when using the CMD target. Additionally, a target
are included, to start a telnetd service and establish a session over it, or deploy a to deploy a native mipsel payload, when wget is available on the target device, has
native mipsel payload. This module has been tested successfully on DIR-300, DIR-600, been added. This module has been tested on DIR-865 and DIR-645 devices.
DIR-645, DIR-845 and DIR-865. According to the vulnerability discoverer,
more D-Link devices may affected.
}, },
'Author' => 'Author' =>
[ [

View File

@ -15,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info = {}) def initialize(info = {})
super(update_info(info, super(update_info(info,
'Name' => 'D-Link Devices UPnP SOAP Command Execution', 'Name' => 'D-Link Devices UPnP SOAP Telnetd Command Execution',
'Description' => %q{ 'Description' => %q{
Different D-Link Routers are vulnerable to OS command injection in the UPnP SOAP Different D-Link Routers are vulnerable to OS command injection in the UPnP SOAP
interface. This module has been tested successfully on DIR-300, DIR-600, DIR-645, interface. This module has been tested successfully on DIR-300, DIR-600, DIR-645,