Skip to content

Commit ef6bf54

Browse files
committed
Fix metadata
1 parent 1da6b32 commit ef6bf54

File tree

1 file changed

+8
-7
lines changed

1 file changed

+8
-7
lines changed

modules/exploits/linux/http/multi_ncc_ping_exec.rb

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -15,15 +15,16 @@ class Metasploit3 < Msf::Exploit::Remote
1515

1616
def initialize(info = {})
1717
super(update_info(info,
18-
'Name' => 'D-Link/TRENDnet NCC Command Injection (ping.ccp)',
18+
'Name' => 'D-Link/TRENDnet NCC Service Command Injection',
1919
'Description' => %q{
20-
This module exploits a remote command injection vulnerability on several routers. This
21-
module was tested in an emulated environment of a DIR-626L only. Several D-Link and
22-
TRENDnet devices are reported as affected: D-Link DIR-626L (Rev A) v1.04b04, D-Link
23-
DIR-636L (Rev A) v1.04, D-Link DIR-808L (Rev A) v1.03b05, D-Link DIR-810L (Rev A) v1.01b04,
24-
D-Link DIR-810L (Rev B) v2.02b01, D-Link DIR-820L (Rev A) v1.02B10, D-Link DIR-820L (Rev A)
20+
This module exploits a remote command injection vulnerability on several routers. The
21+
vulnerability exists in the ncc service, while handling ping commands. This module has
22+
been tested on a DIR-626L emulated environment only. Several D-Link and TRENDnet devices
23+
are reported as affected, including: D-Link DIR-626L (Rev A) v1.04b04, D-Link DIR-636L
24+
(Rev A) v1.04, D-Link DIR-808L (Rev A) v1.03b05, D-Link DIR-810L (Rev A) v1.01b04, D-Link
25+
DIR-810L (Rev B) v2.02b01, D-Link DIR-820L (Rev A) v1.02B10, D-Link DIR-820L (Rev A)
2526
v1.05B03, D-Link DIR-820L (Rev B) v2.01b02, D-Link DIR-826L (Rev A) v1.00b23, D-Link
26-
DIR-830L (Rev A) v1.00b07, D-Link DIR-836L (Rev A) v1.01b03, TRENDnet TEW-731BR (Rev 2)
27+
DIR-830L (Rev A) v1.00b07, D-Link DIR-836L (Rev A) v1.01b03 and TRENDnet TEW-731BR (Rev 2)
2728
v2.01b01
2829
},
2930
'Author' =>

0 commit comments

Comments
 (0)