Skip to content

Commit 1a904cc

Browse files
author
m-1-k-3
committed
tftp download
1 parent aee5b02 commit 1a904cc

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed

modules/exploits/linux/http/linksys_wrt160nv2_apply_exec.rb

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,8 @@ def initialize(info = {})
2323
Some Linksys Routers are vulnerable to an authenticated OS command injection.
2424
Default credentials for the web interface are admin/admin or admin/password. Since
2525
it is a blind os command injection vulnerability, there is no output for the
26-
executed command when using the cmd generic payload. A ping command against a
26+
executed command when using the cmd generic payload. This module was tested on a
27+
Linksys WRT160n version 2 - firmware version v2.0.03. A ping command against a
2728
controlled system could be used for testing purposes. The exploit uses the tftp
2829
client from the device to download the payload.
2930
},

0 commit comments

Comments
 (0)