Skip to content

Commit 86c025d

Browse files
author
Tod Beardsley
committed
Title and description fixes for rapid7#6470
1 parent 3d04f40 commit 86c025d

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

modules/auxiliary/voip/telisca_ips_lock_control.rb

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -11,17 +11,18 @@ class Metasploit3 < Msf::Auxiliary
1111

1212
def initialize(info = {})
1313
super(update_info(info,
14-
'Name' => 'Telisca IPS Lock Control',
14+
'Name' => 'Telisca IPS Lock Cisco IP Phone Control',
1515
'Description' => %q{
16-
This modules will exploit the vulnerabilities of Telisca IPSLock in order to lock or unlock
17-
IP Phones. You need to be in the voip vlan and you have to know the phone name.
18-
Example : SEP002497AB1D4B.
16+
This module allows an unauthenticated attacker to exercise the
17+
"Lock" and "Unlock" functionality of Telisca IPS Lock for Cisco IP
18+
Phones. This module should be run in the VoIP VLAN, and requires
19+
knowledge of the target phone's name (for example, SEP002497AB1D4B).
1920
2021
Set ACTION to either LOCK or UNLOCK. UNLOCK is the default.
2122
},
2223
'References' =>
2324
[
24-
# First publicly known resource
25+
# Publicly disclosed via Metaploit PR
2526
'URL', 'https://github.com/rapid7/metasploit-framework/pull/6470'
2627
],
2728
'Author' =>
@@ -42,10 +43,9 @@ def initialize(info = {})
4243
register_options(
4344
[
4445
OptAddress.new('RHOST', [true, 'The IPS Lock IP Address']),
45-
OptString.new('PHONENAME', [true, 'The name of the victim phone. Ex: SEP002497AB1D4B'])
46+
OptString.new('PHONENAME', [true, 'The name of the target phone'])
4647
], self.class)
4748

48-
deregister_options('RHOSTS')
4949
end
5050

5151
def print_status(msg='')

0 commit comments

Comments
 (0)