@@ -19,13 +19,13 @@ def initialize(info = {})
19
19
super ( update_info ( info ,
20
20
'Name' => 'Netgear DGN1000B setup.cgi Remote Command Execution' ,
21
21
'Description' => %q{
22
- Some Netgear Routers are vulnerable to OS Command injection.
23
- You will need credentials to the webinterface to access the vulnerable part
24
- of the application . Default credentials are always a good starting point.
25
- admin/admin or admin/password could be a first try. Since it is a blind
26
- os command injection vulnerability, there is no output for the executed
27
- command when using the cmd generic payload. A ping command against a
28
- controlled system could be used for testing purposes.
22
+ Some Netgear Routers are vulnerable to authenticated OS Command injection. The
23
+ vulnerability exists in the web interface, specifically in the setup.cgi component,
24
+ when handling the TimeToLive parameter . Default credentials are always a good
25
+ starting point, admin/admin or admin/password could be a first try. Since it is a
26
+ blind os command injection vulnerability, there is no output for the executed
27
+ command when using the cmd generic payload. A ping command against a controlled
28
+ system could be used for testing purposes.
29
29
} ,
30
30
'Author' =>
31
31
[
@@ -147,7 +147,7 @@ def exploit
147
147
return
148
148
end
149
149
150
- #thx to Juan for his awesome work on the mipsel elf support
150
+ #thx to Juan for his awesome work on the mipsbe elf support
151
151
@pl = generate_payload_exe
152
152
@elf_sent = false
153
153
0 commit comments