File tree Expand file tree Collapse file tree 1 file changed +2
-2
lines changed
modules/exploits/linux/http Expand file tree Collapse file tree 1 file changed +2
-2
lines changed Original file line number Diff line number Diff line change @@ -13,9 +13,9 @@ class Metasploit3 < Msf::Exploit::Remote
13
13
14
14
def initialize ( info = { } )
15
15
super ( update_info ( info ,
16
- 'Name' => 'D-Link Devices UPnP SOAPAction-Header Command Execution' ,
16
+ 'Name' => 'D-Link Devices HNAP SOAPAction-Header Command Execution' ,
17
17
'Description' => %q{
18
- Different D-Link Routers are vulnerable to OS command injection in the UPnP SOAP
18
+ Different D-Link Routers are vulnerable to OS command injection in the HNAP SOAP
19
19
interface. Since it is a blind OS command injection vulnerability, there is no
20
20
output for the executed command. This module has been tested on a DIR-645 device.
21
21
The following devices are also reported as affected: DAP-1522 revB, DAP-1650 revB,
You can’t perform that action at this time.
0 commit comments