diff --git a/documentation/modules/exploit/linux/http/geutebruck_testaction_exec.md b/documentation/modules/exploit/linux/http/geutebruck_testaction_exec.md index 936310d279..a4960686f0 100644 --- a/documentation/modules/exploit/linux/http/geutebruck_testaction_exec.md +++ b/documentation/modules/exploit/linux/http/geutebruck_testaction_exec.md @@ -1,10 +1,10 @@ ## Vulnerable Application -The web interface of the following [Geutebruck](https://www.geutebrueck.com) products using firmware <= 1.12.0.25 and also the 1.12.13.2 and the 1.12.14.5 "limited versions" are concerned: +The following [Geutebruck](https://www.geutebrueck.com) products using firmware <= 1.12.0.25 and also the 1.12.13.2 and the 1.12.14.5: Encoder and E2 Series Camera models: -G-Code: +G-Code: EEC-2xxx -G-Cam: +G-Cam: EBC-21xx EFD-22xx ETHC-22xx @@ -27,7 +27,7 @@ This module has been tested on a Geutebruck 5.02024 G-Cam/EFD-2250 running 1.12. ### Description -This exploit a simple OS command injection (CVE-2020-16205) in the /uapi-cgi/admin/testaction.cgi page of the web interface of the Geutebruck G-Cam and G-Code products. +This exploit a simple OS command injection (CVE-2020-16205) in the /uapi-cgi/admin/testaction.cgi page of the web interface. Here is the advisory: https://us-cert.cisa.gov/ics/advisories/icsa-20-219-03 ## Verification Steps