Commit 46174915 by lucyoa

Fixing pep

parent 723ee3e0
......@@ -22,8 +22,7 @@ class Exploit(exploits.Exploit):
'description': 'Module exploits an buffer overflow that leads to remote code execution',
'authors': ['Austin <github.com/realoriginal>'], # routersploit module
'references':
[
'references': [
'http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10008',
'http://www.dlink.com/us/en/home-solutions/connect/routers/dir-645-wireless-n-home-router-1000',
'http://roberto.greyhats.it/advisories/20130801-dlink-dir645.txt',
......@@ -68,7 +67,7 @@ class Exploit(exploits.Exploit):
response = http_request(method="POST", url=url, headers=headers, data=data, cookies=cookies)
if response is None:
return ""
return response.text[response.text.find("</hedwig>")+len("</hedwig>"):].strip()
return response.text[response.text.find("</hedwig>") + len("</hedwig>"):].strip()
@mute
def check(self):
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment