File tree Expand file tree Collapse file tree 1 file changed +7
-1
lines changed
modules/exploits/linux/http Expand file tree Collapse file tree 1 file changed +7
-1
lines changed Original file line number Diff line number Diff line change @@ -17,8 +17,14 @@ class Metasploit3 < Msf::Exploit::Remote
17
17
18
18
def initialize ( info = { } )
19
19
super ( update_info ( info ,
20
- 'Name' => 'Dlink DIR615 Command Execution - Upload and Execute' ,
20
+ 'Name' => 'D-Link DIR615h Command Execution - Upload and Execute' ,
21
21
'Description' => %q{
22
+ Some D-Link Routers are vulnerable to an authenticated OS command injection.
23
+ Default credentials for the web interface are admin/admin or admin/password. Since
24
+ it is a blind os command injection vulnerability, there is no output for the
25
+ executed command when using the cmd generic payload. A ping command against a
26
+ controlled system could be used for testing purposes. The exploit uses the wget
27
+ client from the device to download the payload.
22
28
} ,
23
29
'Author' =>
24
30
[
You can’t perform that action at this time.
0 commit comments