We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 6de2be6 commit eb9d2f1Copy full SHA for eb9d2f1
modules/exploits/linux/http/dlink_dspw215_info_cgi_bof.rb
@@ -13,7 +13,7 @@ class Metasploit3 < Msf::Exploit::Remote
13
14
def initialize(info = {})
15
super(update_info(info,
16
- 'Name' => 'D-Link info.cgi Buffer Overflow in POST Request',
+ 'Name' => 'D-Link info.cgi POST Request Buffer Overflow',
17
'Description' => %q{
18
This module exploits an anonymous remote code execution vulnerability on different D-Link
19
devices. The vulnerability is an stack based buffer overflow in the my_cgi.cgi component,
0 commit comments