Skip to content

Commit ce88d84

Browse files
author
jvazquez-r7
committed
cleanup for netgear_dgn1000b_setup_exec
1 parent 3c27678 commit ce88d84

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

modules/exploits/linux/http/netgear_dgn1000b_setup_exec.rb

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -19,13 +19,13 @@ def initialize(info = {})
1919
super(update_info(info,
2020
'Name' => 'Netgear DGN1000B setup.cgi Remote Command Execution',
2121
'Description' => %q{
22-
Some Netgear Routers are vulnerable to OS Command injection.
23-
You will need credentials to the webinterface to access the vulnerable part
24-
of the application. Default credentials are always a good starting point.
25-
admin/admin or admin/password could be a first try. Since it is a blind
26-
os command injection vulnerability, there is no output for the executed
27-
command when using the cmd generic payload. A ping command against a
28-
controlled system could be used for testing purposes.
22+
Some Netgear Routers are vulnerable to authenticated OS Command injection. The
23+
vulnerability exists in the web interface, specifically in the setup.cgi component,
24+
when handling the TimeToLive parameter. Default credentials are always a good
25+
starting point, admin/admin or admin/password could be a first try. Since it is a
26+
blind os command injection vulnerability, there is no output for the executed
27+
command when using the cmd generic payload. A ping command against a controlled
28+
system could be used for testing purposes.
2929
},
3030
'Author' =>
3131
[
@@ -147,7 +147,7 @@ def exploit
147147
return
148148
end
149149

150-
#thx to Juan for his awesome work on the mipsel elf support
150+
#thx to Juan for his awesome work on the mipsbe elf support
151151
@pl = generate_payload_exe
152152
@elf_sent = false
153153

0 commit comments

Comments
 (0)