diff --git a/modules/exploits/linux/http/dlink_upnp_exec_noauth.rb b/modules/exploits/linux/http/dlink_upnp_exec_noauth.rb index 8dfe90bd66..e8676e1b92 100644 --- a/modules/exploits/linux/http/dlink_upnp_exec_noauth.rb +++ b/modules/exploits/linux/http/dlink_upnp_exec_noauth.rb @@ -40,6 +40,7 @@ class Metasploit3 < Msf::Exploit::Remote 'References' => [ [ 'OSVDB', '94924' ], + [ 'BID', '61005' ], [ 'EDB', '26664' ], [ 'URL', 'http://www.s3cur1ty.de/m1adv2013-020' ] ], @@ -64,7 +65,7 @@ class Metasploit3 < Msf::Exploit::Remote 'Platform' => 'unix' } ], - [ 'Linux mipsel Payload', #DIR-865, DIR-645, and some more + [ 'Linux mipsel Payload', #DIR-865, DIR-645, and others with wget installed { 'Arch' => ARCH_MIPSLE, 'Platform' => 'linux' @@ -87,7 +88,6 @@ class Metasploit3 < Msf::Exploit::Remote def request(cmd, type, new_external_port, new_internal_port, new_portmapping_description) uri = '/soap.cgi' - #data_uri = "?service=WANIPConn1" data_cmd = "" data_cmd << ""