Skip to content

Commit 1ec0e09

Browse files
author
m-1-k-3
committed
msftidy
1 parent 58099d0 commit 1ec0e09

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

modules/exploits/linux/http/airties_login_cgi_bof.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,13 +13,13 @@ class Metasploit3 < Msf::Exploit::Remote
1313

1414
def initialize(info = {})
1515
super(update_info(info,
16-
'Name' => 'Airties login cgi Buffer Overflow',
16+
'Name' => 'Airties login-cgi Buffer Overflow',
1717
'Description' => %q{
1818
This module exploits an remote buffer overflow vulnerability on several Airties routers.
1919
The vulnerability exists in the handling of HTTP queries to the login cgi with
20-
long redirect parameter values. The vulnerability can be exploitable without authentication.
20+
long redirect parameter values. The vulnerability can be exploitable without authentication.
2121
This module has been tested successfully on Airties firmware AirTies_Air5650v3TT_FW_1.0.2.0.bin
22-
in emulation. Other firmware versions such as the Air6372, Air5760, Air5750, Air5650TT, Air5453,
22+
in emulation. Other firmware versions such as the Air6372, Air5760, Air5750, Air5650TT, Air5453,
2323
Air5444TT, Air5443, Air5442, Air5343, Air5342, Air5341, Air5021 are also reported as vulnerable.
2424
},
2525
'Author' =>

0 commit comments

Comments
 (0)