We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent ed0b9b0 commit 336c56bCopy full SHA for 336c56b
modules/exploits/linux/http/dlink_dir605l_captcha_bof.rb
@@ -19,7 +19,7 @@ def initialize(info = {})
19
This module exploits an anonymous remote code execution vulnerability on D-Link DIR-605L routers. The
20
vulnerability exists while handling user supplied captcha information, and is due to the
21
insecure usage of sprintf on the getAuthCode() function. This module has been tested
22
- successfully on DLink DIR-605L Firmware 1.13 under a QEMU environment.
+ successfully on D-Link DIR-605L firmware 1.13 (emulated) and firmware 1.12 (real).
23
},
24
'Author' =>
25
[
0 commit comments