Skip to content

Commit a4f0666

Browse files
committed
Land rapid7#6081, DLink -> D-Link
2 parents 8c8ce17 + 185e947 commit a4f0666

File tree

2 files changed

+4
-4
lines changed

2 files changed

+4
-4
lines changed

modules/auxiliary/scanner/http/dlink_user_agent_backdoor.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,9 +15,9 @@ class Metasploit3 < Msf::Auxiliary
1515

1616
def initialize
1717
super(
18-
'Name' => 'DLink User-Agent Backdoor Scanner',
18+
'Name' => 'D-Link User-Agent Backdoor Scanner',
1919
'Description' => %q{
20-
This module attempts to find DLink devices running Alphanetworks web interfaces affected
20+
This module attempts to find D-Link devices running Alphanetworks web interfaces affected
2121
by the backdoor found on the User-Agent header. This module has been tested successfully
2222
on a DIR-100 device with firmware version v1.13.
2323
},

modules/exploits/linux/http/dlink_dir605l_captcha_bof.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ def initialize(info = {})
1919
This module exploits an anonymous remote code execution vulnerability on D-Link DIR-605L routers. The
2020
vulnerability exists while handling user supplied captcha information, and is due to the
2121
insecure usage of sprintf on the getAuthCode() function. This module has been tested
22-
successfully on DLink DIR-605L Firmware 1.13 under a QEMU environment.
22+
successfully on D-Link DIR-605L firmware 1.13 (emulated) and firmware 1.12 (real).
2323
},
2424
'Author' =>
2525
[
@@ -42,7 +42,7 @@ def initialize(info = {})
4242
],
4343
'Targets' =>
4444
[
45-
[ 'DLink DIR-605L 1.13',
45+
[ 'D-Link DIR-605L 1.13', # Works on 1.12 as well
4646
{
4747
'Offset' => 94,
4848
'LibcBase' => 0x2ab86000, # According to Original Exploit by Craig Heffner

0 commit comments

Comments
 (0)