Skip to content

Commit 6feb52f

Browse files
committed
Land rapid7#5288, energizer_duo_payload fixes
2 parents 3baa717 + aa59b3a commit 6feb52f

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

modules/exploits/windows/backdoor/energizer_duo_payload.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,12 +13,12 @@ class Metasploit3 < Msf::Exploit::Remote
1313

1414
def initialize(info = {})
1515
super(update_info(info,
16-
'Name' => 'Energizer DUO Trojan Code Execution',
16+
'Name' => 'Energizer DUO USB Battery Charger Arucer.dll Trojan Code Execution',
1717
'Description' => %q{
1818
This module will execute an arbitrary payload against
1919
any system infected with the Arugizer trojan horse. This
2020
backdoor was shipped with the software package accompanying
21-
the Energizer Duo USB battery charger.
21+
the Energizer DUO USB battery charger.
2222
},
2323
'Author' => [ 'hdm' ],
2424
'License' => MSF_LICENSE,

0 commit comments

Comments
 (0)