Skip to content

Commit 2274e38

Browse files
author
Pedro Ribeiro
committed
fix msftidy stuff
1 parent b863db9 commit 2274e38

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

modules/exploits/linux/http/trueonline_billion_5200w_rce.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ class MetasploitModule < Msf::Exploit::Remote
1212

1313
def initialize(info = {})
1414
super(update_info(info,
15-
'Name' => 'TrueOnline / Billion 5200W-T router Unauthenticated Command Injection',
15+
'Name' => 'TrueOnline / Billion 5200W-T Router Unauthenticated Command Injection',
1616
'Description' => %q{
1717
TrueOnline is a major ISP in Thailand, and it distributes a customised version of
1818
the Billion 5200W-T router. This customised version has at least two command injection
@@ -34,7 +34,7 @@ def initialize(info = {})
3434
'References' =>
3535
[
3636
['URL', 'GITHUB'],
37-
['URL', 'FULLDISC'],
37+
['URL', 'https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt'],
3838
['URL', 'https://blogs.securiteam.com/index.php/archives/2910']
3939
],
4040
'Targets' =>
@@ -44,7 +44,7 @@ def initialize(info = {})
4444
'Privileged' => true,
4545
'Arch' => ARCH_CMD,
4646
'DefaultOptions' => { 'PAYLOAD' => 'cmd/unix/interact' },
47-
'DisclosureDate' => 'TBD',
47+
'DisclosureDate' => 'Dec 26 2016',
4848
'DefaultTarget' => 0))
4949
register_options(
5050
[

0 commit comments

Comments
 (0)