@@ -15,15 +15,16 @@ class Metasploit3 < Msf::Exploit::Remote
15
15
16
16
def initialize ( info = { } )
17
17
super ( update_info ( info ,
18
- 'Name' => 'D-Link/TRENDnet NCC Command Injection (ping.ccp) ' ,
18
+ 'Name' => 'D-Link/TRENDnet NCC Service Command Injection' ,
19
19
'Description' => %q{
20
- This module exploits a remote command injection vulnerability on several routers. This
21
- module was tested in an emulated environment of a DIR-626L only. Several D-Link and
22
- TRENDnet devices are reported as affected: D-Link DIR-626L (Rev A) v1.04b04, D-Link
23
- DIR-636L (Rev A) v1.04, D-Link DIR-808L (Rev A) v1.03b05, D-Link DIR-810L (Rev A) v1.01b04,
24
- D-Link DIR-810L (Rev B) v2.02b01, D-Link DIR-820L (Rev A) v1.02B10, D-Link DIR-820L (Rev A)
20
+ This module exploits a remote command injection vulnerability on several routers. The
21
+ vulnerability exists in the ncc service, while handling ping commands. This module has
22
+ been tested on a DIR-626L emulated environment only. Several D-Link and TRENDnet devices
23
+ are reported as affected, including: D-Link DIR-626L (Rev A) v1.04b04, D-Link DIR-636L
24
+ (Rev A) v1.04, D-Link DIR-808L (Rev A) v1.03b05, D-Link DIR-810L (Rev A) v1.01b04, D-Link
25
+ DIR-810L (Rev B) v2.02b01, D-Link DIR-820L (Rev A) v1.02B10, D-Link DIR-820L (Rev A)
25
26
v1.05B03, D-Link DIR-820L (Rev B) v2.01b02, D-Link DIR-826L (Rev A) v1.00b23, D-Link
26
- DIR-830L (Rev A) v1.00b07, D-Link DIR-836L (Rev A) v1.01b03, TRENDnet TEW-731BR (Rev 2)
27
+ DIR-830L (Rev A) v1.00b07, D-Link DIR-836L (Rev A) v1.01b03 and TRENDnet TEW-731BR (Rev 2)
27
28
v2.01b01
28
29
} ,
29
30
'Author' =>
0 commit comments