Update modules/exploits/linux/http/geutebruck_testaction_exec.rb
Co-authored-by: bcoles <bcoles@gmail.com>
This commit is contained in:
parent
a69d941a72
commit
5f6a0746a6
|
@ -13,7 +13,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
|||
super(update_info(info,
|
||||
'Name' => 'Geutebruck testaction.cgi Remote Command Execution',
|
||||
'Description' => %q{
|
||||
This module exploits a an arbitrary command execution vulnerability. The
|
||||
This module exploits an arbitrary command execution vulnerability. The
|
||||
vulnerability exists in the /uapi-cgi/testaction.cgi page and allows an
|
||||
authenticated user to execute arbitrary commands with root privileges.
|
||||
with web user privileges. Firmware <= 1.12.14.5 are concerned.
|
||||
|
|
Loading…
Reference in New Issue