Skip to content

Commit 53043dc

Browse files
author
m-1-k-3
committed
make msftidy happy
1 parent 6fbce56 commit 53043dc

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

modules/exploits/linux/http/realtek_miniigd_upnp_exec_noauth.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,9 +15,9 @@ def initialize(info = {})
1515
super(update_info(info,
1616
'Name' => 'Realtek SDK Miniigd UPnP SOAP Command Execution',
1717
'Description' => %q{
18-
Different devices using the Realtek SDK with the miniigd daemon are vulnerable to OS command
19-
injection in the UPnP SOAP interface. Since it is a blind OS command injection vulnerability,
20-
there is no output for the executed command.
18+
Different devices using the Realtek SDK with the miniigd daemon are vulnerable to OS command
19+
injection in the UPnP SOAP interface. Since it is a blind OS command injection vulnerability,
20+
there is no output for the executed command.
2121
This module has been tested in emulation on a Trendnet TEW-731BR router.
2222
},
2323
'Author' =>

0 commit comments

Comments
 (0)