File tree Expand file tree Collapse file tree 2 files changed +4
-4
lines changed Expand file tree Collapse file tree 2 files changed +4
-4
lines changed Original file line number Diff line number Diff line change @@ -15,9 +15,9 @@ class Metasploit3 < Msf::Auxiliary
15
15
16
16
def initialize
17
17
super (
18
- 'Name' => 'DLink User-Agent Backdoor Scanner' ,
18
+ 'Name' => 'D-Link User-Agent Backdoor Scanner' ,
19
19
'Description' => %q{
20
- This module attempts to find DLink devices running Alphanetworks web interfaces affected
20
+ This module attempts to find D-Link devices running Alphanetworks web interfaces affected
21
21
by the backdoor found on the User-Agent header. This module has been tested successfully
22
22
on a DIR-100 device with firmware version v1.13.
23
23
} ,
Original file line number Diff line number Diff line change @@ -19,7 +19,7 @@ def initialize(info = {})
19
19
This module exploits an anonymous remote code execution vulnerability on D-Link DIR-605L routers. The
20
20
vulnerability exists while handling user supplied captcha information, and is due to the
21
21
insecure usage of sprintf on the getAuthCode() function. This module has been tested
22
- successfully on DLink DIR-605L Firmware 1.13 under a QEMU environment .
22
+ successfully on D-Link DIR-605L firmware 1.13 (emulated) and firmware 1.12 (real) .
23
23
} ,
24
24
'Author' =>
25
25
[
@@ -42,7 +42,7 @@ def initialize(info = {})
42
42
] ,
43
43
'Targets' =>
44
44
[
45
- [ 'DLink DIR-605L 1.13' ,
45
+ [ 'D-Link DIR-605L 1.13' , # Works on 1.12 as well
46
46
{
47
47
'Offset' => 94 ,
48
48
'LibcBase' => 0x2ab86000 , # According to Original Exploit by Craig Heffner
You can’t perform that action at this time.
0 commit comments