Commit 469ff7f7 by Marcin Bury

Fixing description and comments

parent bc26a09e
...@@ -12,12 +12,12 @@ from routersploit import ( ...@@ -12,12 +12,12 @@ from routersploit import (
class Exploit(exploits.Exploit): class Exploit(exploits.Exploit):
""" """
Exploit implementation for multiple Netgear's Remote Code Execution vulnerability. Exploit implementation for Netgear R7000 and R6400 Remote Code Execution vulnerability.
If the target is vulnerable, command loop is invoked that allows executing commands on operating system level. If the target is vulnerable, command loop is invoked that allows executing commands on operating system level.
""" """
__info__ = { __info__ = {
'name': 'Netgear R7000 & R6400 RCE', 'name': 'Netgear R7000 & R6400 RCE',
'description': 'Module exploits remote command execution in multiple Netgear devices. If the target is ' 'description': 'Module exploits remote command execution in Netgear R7000 and R6400 devices. If the target is '
'vulnerable, command loop is invoked that allows executing commands on operating system level.', 'vulnerable, command loop is invoked that allows executing commands on operating system level.',
'authors': [ 'authors': [
'Chad Dougherty', # vulnerability discovery 'Chad Dougherty', # vulnerability discovery
...@@ -70,6 +70,6 @@ class Exploit(exploits.Exploit): ...@@ -70,6 +70,6 @@ class Exploit(exploits.Exploit):
if "WWW-Authenticate" in response.headers.keys(): if "WWW-Authenticate" in response.headers.keys():
if any(map(lambda x: x in response.headers['WWW-Authenticate'], ["NETGEAR R7000", "NETGEAR R6400"])): if any(map(lambda x: x in response.headers['WWW-Authenticate'], ["NETGEAR R7000", "NETGEAR R6400"])):
return True return True # target is vulnerable
return False return False # target is not vulnerable
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment