Skip to content

Commit b3feb51

Browse files
author
jvazquez-r7
committed
cleanup for linksys_e1500_up_exec
1 parent 5e42b84 commit b3feb51

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

modules/exploits/linux/http/linksys_e1500_up_exec.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
1717

1818
def initialize(info = {})
1919
super(update_info(info,
20-
'Name' => 'Linksys E1500/E2500 Command Execution - Upload and Execute',
20+
'Name' => 'Linksys E1500/E2500 apply.cgi Remote Command Injection',
2121
'Description' => %q{
2222
Some Linksys Routers are vulnerable to an authenticated OS command injection.
2323
Default credentials for the web interface are admin/admin or admin/password. Since
@@ -161,7 +161,7 @@ def exploit
161161
datastore['SSL'] = false
162162
end
163163

164-
#we use SRVHOST as download IP for the coming wget command.
164+
#we use SRVHOST as download IP for the coming wget command.
165165
#SRVHOST needs a real IP address of our download host
166166
if (datastore['SRVHOST'] == "0.0.0.0" or datastore['SRVHOST'] == "::")
167167
srv_host = Rex::Socket.source_address(rhost)

0 commit comments

Comments
 (0)