File tree Expand file tree Collapse file tree 1 file changed +2
-2
lines changed
modules/exploits/linux/http Expand file tree Collapse file tree 1 file changed +2
-2
lines changed Original file line number Diff line number Diff line change @@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
17
17
18
18
def initialize ( info = { } )
19
19
super ( update_info ( info ,
20
- 'Name' => 'Linksys E1500/E2500 Command Execution - Upload and Execute ' ,
20
+ 'Name' => 'Linksys E1500/E2500 apply.cgi Remote Command Injection ' ,
21
21
'Description' => %q{
22
22
Some Linksys Routers are vulnerable to an authenticated OS command injection.
23
23
Default credentials for the web interface are admin/admin or admin/password. Since
@@ -161,7 +161,7 @@ def exploit
161
161
datastore [ 'SSL' ] = false
162
162
end
163
163
164
- #we use SRVHOST as download IP for the coming wget command.
164
+ #we use SRVHOST as download IP for the coming wget command.
165
165
#SRVHOST needs a real IP address of our download host
166
166
if ( datastore [ 'SRVHOST' ] == "0.0.0.0" or datastore [ 'SRVHOST' ] == "::" )
167
167
srv_host = Rex ::Socket . source_address ( rhost )
You can’t perform that action at this time.
0 commit comments