@@ -25,28 +25,27 @@ def initialize(info = {})
25
25
[
26
26
'unknown' , # Vulnerability discovery
27
27
'Fabian Braeunlein <[email protected] >' , #Metasploit PoC with wget method
28
- 'Michael Messner <[email protected] >' , # Metasploit module
29
- 'juan vazquez' # minor help with msf module
28
+ 'Michael Messner <[email protected] >' # Metasploit module
30
29
] ,
31
30
'License' => MSF_LICENSE ,
32
31
'References' =>
33
32
[
33
+ [ 'OSVDB' , '103289' ] ,
34
+ [ 'BID' , '65520' ] ,
34
35
[ 'URL' , 'http://www.kapple.de/?p=75' ] , #vulnerability details with PoC
35
36
[ 'URL' , 'https://www.speckmarschall.de/hoere.htm' ] , #probably the first published details (now censored)
36
37
[ 'URL' , 'http://pastebin.com/GnMKGmZ2' ] , #published details uncensored from speckmarschall
37
38
[ 'URL' , 'http://www.avm.de/en/Sicherheit/update_list.html' ] , #vendor site with a list of vulnerable devices
38
- [ 'URL' , 'http://breaking.systems/blog/2014/04/avm-fritzbox-root-rce-from-patch-to-metasploit-module-ii' ] , #wirteup with PoC
39
- [ 'BID' , '65520' ] ,
40
- [ 'OSVDB' , '103289' ]
39
+ [ 'URL' , 'http://breaking.systems/blog/2014/04/avm-fritzbox-root-rce-from-patch-to-metasploit-module-ii' ] #wirteup with PoC
41
40
] ,
42
41
'DisclosureDate' => 'Feb 11 2014' ,
43
42
'Privileged' => true ,
44
- 'Platform' => %w{ linux } ,
43
+ 'Platform' => 'linux' ,
44
+ 'Arch' => ARCH_MIPSLE ,
45
45
'Payload' =>
46
46
{
47
47
'DisableNops' => true
48
48
} ,
49
- 'Arch' => ARCH_MIPSLE ,
50
49
'Targets' =>
51
50
[
52
51
[ 'Automatic Targeting' , { } ] ,
0 commit comments