Skip to content

Commit ddac560

Browse files
author
Tod Beardsley
committed
Reference TR-064, not TR-069
1 parent 43cd788 commit ddac560

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

modules/exploits/linux/http/tr069_ntpserver_cmdinject.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,11 +8,11 @@ class MetasploitModule < Msf::Exploit::Remote
88

99
def initialize(info = {})
1010
super(update_info(info,
11-
'Name' => 'Zyxel/Eir D1000 DSL Modem NewNTPServer Command Injection Over TR-069',
11+
'Name' => 'Zyxel/Eir D1000 DSL Modem NewNTPServer Command Injection Over TR-064',
1212
'Description' => %q{
1313
Broadband DSL modems manufactured by Zyxel and distributed by some
1414
European ISPs are vulnerable to a command injection vulnerability when setting
15-
the 'NewNTPServer' value using the TR-069 SOAP-based configuration protocol. In
15+
the 'NewNTPServer' value using the TR-64 SOAP-based configuration protocol. In
1616
the tested case, no authentication is required to set this value on affected
1717
DSL modems.
1818
@@ -56,7 +56,7 @@ def initialize(info = {})
5656

5757
register_options(
5858
[
59-
Opt::RPORT(7547), # TR-069 CWMP port for SOAP/XML commands
59+
Opt::RPORT(7547), # TR-064 CWMP port for SOAP/XML commands
6060
OptBool::new('FORCE_EXPLOIT', [false, 'Force an attempt even if the check fails', nil])
6161
], self.class)
6262

0 commit comments

Comments
 (0)