You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: documentation/modules/auxiliary/scanner/telnet/satel_cmd_exec.md
+7-2Lines changed: 7 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,4 +1,9 @@
1
-
This module exploits an OS Command Injection vulnerability in Satel SenNet Data Loggers to perform arbitrary command execution as 'root'.
1
+
This module exploits an OS Command Injection vulnerability in Satel SenNet Data Logger and Electricity Meters to perform arbitrary command execution as 'root'.
2
+
3
+
The following versions of SenNet Data Logger and Electricity Meters, monitoring platforms, are affected:
4
+
1. SenNet Optimal DataLogger V5.37c-1.43c and prior,
5
+
2. SenNet Solar Datalogger V5.03-1.56a and prior, and
6
+
3. SenNet Multitask Meter V5.21a-1.18b and prior.
2
7
3
8
## Verification Steps
4
9
@@ -16,7 +21,7 @@ msf auxiliary(satel_cmd_exec) > run
0 commit comments