We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 4995728 commit 6c6a778Copy full SHA for 6c6a778
modules/exploits/multi/misc/arkeia_agent_exec.rb
@@ -15,7 +15,7 @@ class Metasploit3 < Msf::Exploit::Remote
15
16
def initialize(info = {})
17
super(update_info(info,
18
- 'Name' => 'WD Arkeia Remote Code Execution',
+ 'Name' => 'Western Digital Arkeia Remote Code Execution',
19
'Description' => %q{
20
This module exploits a code execution flaw in Western Digital Arkeia version 11.0.12 and below.
21
The vulnerability exists in the 'arkeiad' daemon listening on TCP port 617. Because there are
0 commit comments