Commit 46174915 by lucyoa

Fixing pep

parent 723ee3e0
...@@ -22,8 +22,7 @@ class Exploit(exploits.Exploit): ...@@ -22,8 +22,7 @@ class Exploit(exploits.Exploit):
'description': 'Module exploits an buffer overflow that leads to remote code execution', 'description': 'Module exploits an buffer overflow that leads to remote code execution',
'authors': ['Austin <github.com/realoriginal>'], # routersploit module 'authors': ['Austin <github.com/realoriginal>'], # routersploit module
'references': 'references': [
[
'http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10008', 'http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10008',
'http://www.dlink.com/us/en/home-solutions/connect/routers/dir-645-wireless-n-home-router-1000', 'http://www.dlink.com/us/en/home-solutions/connect/routers/dir-645-wireless-n-home-router-1000',
'http://roberto.greyhats.it/advisories/20130801-dlink-dir645.txt', 'http://roberto.greyhats.it/advisories/20130801-dlink-dir645.txt',
...@@ -68,7 +67,7 @@ class Exploit(exploits.Exploit): ...@@ -68,7 +67,7 @@ class Exploit(exploits.Exploit):
response = http_request(method="POST", url=url, headers=headers, data=data, cookies=cookies) response = http_request(method="POST", url=url, headers=headers, data=data, cookies=cookies)
if response is None: if response is None:
return "" return ""
return response.text[response.text.find("</hedwig>")+len("</hedwig>"):].strip() return response.text[response.text.find("</hedwig>") + len("</hedwig>"):].strip()
@mute @mute
def check(self): def check(self):
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment