Update modules/exploits/linux/http/geutebruck_testaction_exec.rb

Co-authored-by: bcoles <bcoles@gmail.com>
This commit is contained in:
ddouhine 2020-08-13 16:19:19 +02:00 committed by gwillcox-r7
parent a69d941a72
commit 5f6a0746a6
No known key found for this signature in database
GPG Key ID: D35E05C0F2B81E83
1 changed files with 1 additions and 1 deletions

View File

@ -13,7 +13,7 @@ class MetasploitModule < Msf::Exploit::Remote
super(update_info(info,
'Name' => 'Geutebruck testaction.cgi Remote Command Execution',
'Description' => %q{
This module exploits a an arbitrary command execution vulnerability. The
This module exploits an arbitrary command execution vulnerability. The
vulnerability exists in the /uapi-cgi/testaction.cgi page and allows an
authenticated user to execute arbitrary commands with root privileges.
with web user privileges. Firmware <= 1.12.14.5 are concerned.