Skip to content

Commit 981cc89

Browse files
author
m-1-k-3
committed
description
1 parent 22d8505 commit 981cc89

File tree

1 file changed

+7
-1
lines changed

1 file changed

+7
-1
lines changed

modules/exploits/linux/http/dlink_dir615_up_exec.rb

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,8 +17,14 @@ class Metasploit3 < Msf::Exploit::Remote
1717

1818
def initialize(info = {})
1919
super(update_info(info,
20-
'Name' => 'Dlink DIR615 Command Execution - Upload and Execute',
20+
'Name' => 'D-Link DIR615h Command Execution - Upload and Execute',
2121
'Description' => %q{
22+
Some D-Link Routers are vulnerable to an authenticated OS command injection.
23+
Default credentials for the web interface are admin/admin or admin/password. Since
24+
it is a blind os command injection vulnerability, there is no output for the
25+
executed command when using the cmd generic payload. A ping command against a
26+
controlled system could be used for testing purposes. The exploit uses the wget
27+
client from the device to download the payload.
2228
},
2329
'Author' =>
2430
[

0 commit comments

Comments
 (0)