diff --git a/modules/exploits/linux/http/dlink_hnap_rop.rb b/modules/exploits/linux/http/dlink_hnap_rop.rb index c748e07216..f29d3f1c38 100644 --- a/modules/exploits/linux/http/dlink_hnap_rop.rb +++ b/modules/exploits/linux/http/dlink_hnap_rop.rb @@ -72,6 +72,7 @@ class Metasploit3 < Msf::Exploit::Remote if res && [200, 301, 302].include?(res.code) + # trying to automatically detect a vulnerable device if (target['auto']) if res.body =~ /DIR-505/ && res.body =~ /1.07/ @@ -107,8 +108,9 @@ class Metasploit3 < Msf::Exploit::Remote print_good("#{peer} - detected a vulnerable device") return Exploit::CheckCode::Detected + # no auto-targetting ... the user is responsible else - print_good("#{peer} - detected a device with unknown exploitability") + print_good("#{peer} - detected a device with unknown exploitability ... trying to exploit") return Exploit::CheckCode::Detected end end