Skip to content

Commit 336c56b

Browse files
author
Tod Beardsley
committed
Note the CAPTCHA exploit is good on 1.12.
1 parent ed0b9b0 commit 336c56b

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

modules/exploits/linux/http/dlink_dir605l_captcha_bof.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ def initialize(info = {})
1919
This module exploits an anonymous remote code execution vulnerability on D-Link DIR-605L routers. The
2020
vulnerability exists while handling user supplied captcha information, and is due to the
2121
insecure usage of sprintf on the getAuthCode() function. This module has been tested
22-
successfully on DLink DIR-605L Firmware 1.13 under a QEMU environment.
22+
successfully on D-Link DIR-605L firmware 1.13 (emulated) and firmware 1.12 (real).
2323
},
2424
'Author' =>
2525
[

0 commit comments

Comments
 (0)