Skip to content

Commit 74ea85f

Browse files
committed
Land rapid7#5445 : upnp to hnap rename
2 parents 4a6fec7 + c8123c1 commit 74ea85f

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

modules/exploits/linux/http/dlink_upnp_header_exec_noauth.rb renamed to modules/exploits/linux/http/dlink_hnap_header_exec_noauth.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,9 +13,9 @@ class Metasploit3 < Msf::Exploit::Remote
1313

1414
def initialize(info = {})
1515
super(update_info(info,
16-
'Name' => 'D-Link Devices UPnP SOAPAction-Header Command Execution',
16+
'Name' => 'D-Link Devices HNAP SOAPAction-Header Command Execution',
1717
'Description' => %q{
18-
Different D-Link Routers are vulnerable to OS command injection in the UPnP SOAP
18+
Different D-Link Routers are vulnerable to OS command injection in the HNAP SOAP
1919
interface. Since it is a blind OS command injection vulnerability, there is no
2020
output for the executed command. This module has been tested on a DIR-645 device.
2121
The following devices are also reported as affected: DAP-1522 revB, DAP-1650 revB,

0 commit comments

Comments
 (0)