We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent a9b92ee commit 611b8a1Copy full SHA for 611b8a1
modules/exploits/linux/upnp/dlink_upnp_msearch_exec.rb
@@ -6,13 +6,13 @@
6
require 'msf/core'
7
8
class Metasploit3 < Msf::Exploit::Remote
9
- Rank = NormalRanking
+ Rank = ExcellentRanking
10
11
include Msf::Exploit::CmdStager
12
13
def initialize(info = {})
14
super(update_info(info,
15
- 'Name' => 'D-Link Unauthenticated Command Injection via UPnP M-SEARCH Multicast',
+ 'Name' => 'D-Link Unauthenticated UPnP M-SEARCH Multicast Command Injection',
16
'Description' => %q{
17
Different D-Link Routers are vulnerable to OS command injection via UPnP Multicast
18
requests. This module has been tested on DIR-300 and DIR-645 devices. Zacharia Cutlip
0 commit comments