Skip to content

Commit 6c6a778

Browse files
committed
Modify arkeia_agent_exec title
1 parent 4995728 commit 6c6a778

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

modules/exploits/multi/misc/arkeia_agent_exec.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Remote
1515

1616
def initialize(info = {})
1717
super(update_info(info,
18-
'Name' => 'WD Arkeia Remote Code Execution',
18+
'Name' => 'Western Digital Arkeia Remote Code Execution',
1919
'Description' => %q{
2020
This module exploits a code execution flaw in Western Digital Arkeia version 11.0.12 and below.
2121
The vulnerability exists in the 'arkeiad' daemon listening on TCP port 617. Because there are

0 commit comments

Comments
 (0)