Skip to content

Commit 611b8a1

Browse files
committed
Modify title and ranking
1 parent a9b92ee commit 611b8a1

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

modules/exploits/linux/upnp/dlink_upnp_msearch_exec.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,13 +6,13 @@
66
require 'msf/core'
77

88
class Metasploit3 < Msf::Exploit::Remote
9-
Rank = NormalRanking
9+
Rank = ExcellentRanking
1010

1111
include Msf::Exploit::CmdStager
1212

1313
def initialize(info = {})
1414
super(update_info(info,
15-
'Name' => 'D-Link Unauthenticated Command Injection via UPnP M-SEARCH Multicast',
15+
'Name' => 'D-Link Unauthenticated UPnP M-SEARCH Multicast Command Injection',
1616
'Description' => %q{
1717
Different D-Link Routers are vulnerable to OS command injection via UPnP Multicast
1818
requests. This module has been tested on DIR-300 and DIR-645 devices. Zacharia Cutlip

0 commit comments

Comments
 (0)