Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
R
routersploit
Overview
Overview
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
czos-dpend
routersploit
Commits
469ff7f7
Commit
469ff7f7
authored
Dec 20, 2016
by
Marcin Bury
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Fixing description and comments
parent
bc26a09e
Show whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
4 additions
and
4 deletions
+4
-4
r7000_r6400_rce.py
routersploit/modules/exploits/netgear/r7000_r6400_rce.py
+4
-4
No files found.
routersploit/modules/exploits/netgear/r7000_r6400_rce.py
View file @
469ff7f7
...
...
@@ -12,12 +12,12 @@ from routersploit import (
class
Exploit
(
exploits
.
Exploit
):
"""
Exploit implementation for
multiple Netgear's
Remote Code Execution vulnerability.
Exploit implementation for
Netgear R7000 and R6400
Remote Code Execution vulnerability.
If the target is vulnerable, command loop is invoked that allows executing commands on operating system level.
"""
__info__
=
{
'name'
:
'Netgear R7000 & R6400 RCE'
,
'description'
:
'Module exploits remote command execution in
multiple Netgear
devices. If the target is '
'description'
:
'Module exploits remote command execution in
Netgear R7000 and R6400
devices. If the target is '
'vulnerable, command loop is invoked that allows executing commands on operating system level.'
,
'authors'
:
[
'Chad Dougherty'
,
# vulnerability discovery
...
...
@@ -70,6 +70,6 @@ class Exploit(exploits.Exploit):
if
"WWW-Authenticate"
in
response
.
headers
.
keys
():
if
any
(
map
(
lambda
x
:
x
in
response
.
headers
[
'WWW-Authenticate'
],
[
"NETGEAR R7000"
,
"NETGEAR R6400"
])):
return
True
return
True
# target is vulnerable
return
False
return
False
# target is not vulnerable
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment