@@ -20,7 +19,8 @@ class Exploit(exploits.Exploit):
"""
__info__={
'name':'3Com AP8760 Password Disclosure',
'description':'Exploits 3Com AP8760 password disclosure vulnerability. If the target is vulnerable it is possible to fetch credentials for administration user.',
@@ -17,7 +16,8 @@ class Exploit(exploits.Exploit):
"""
__info__={
'name':'Cisco DPC2420 Info Disclosure',
'description':'Module exploits Cisco DPC2420 information disclosure vulnerability which allows reading sensitive information from the configuration file.',
'description':'Module exploits Cisco DPC2420 information disclosure vulnerability '
'which allows reading sensitive information from the configuration file.',
'authors':[
'Facundo M. de la Cruz (tty0) <fmdlc[at]code4life.com.ar>',# vulnerability discovery
Exploit implementation for Path Traversal vulnerability in Cisco Unified Communications Manager, Cisco Unified Contact Center Express and Cisco Unified IP Interactive Voice Response devices.
Exploit implementation for Path Traversal vulnerability in Cisco Unified Communications Manager,
Cisco Unified Contact Center Express and Cisco Unified IP Interactive Voice Response devices.
If the target is vulnerable it allows to read files from the filesystem.
"""
__info__={
'name':'Cisco Unified Multi Path Traversal',
'description':'Module exploits path traversal vulnerability in Cisco Unified Communications Manager, Cisco Unified Contact Center Express and Cisco Unified IP Interactive Voice Response devices.'
@@ -19,7 +17,8 @@ class Exploit(exploits.Exploit):
"""
__info__={
'name':'Huawei E5331 Info Disclosure',
'description':'Module exploits information disclosure vulnerability in Huawei E5331 MiFi Mobile Hotspot devices. If the target is vulnerable it allows to read sensitive information.',
'description':'Module exploits information disclosure vulnerability in Huawei E5331 MiFi Mobile Hotspot'
'devices. If the target is vulnerable it allows to read sensitive information.',
'description':'Module exploits password disclosure vulnerability in Huawei HG530 and HG520b devices. If the target is vulnerable it allows to read credentials.',
'description':'Module exploits password disclosure vulnerability in Huawei HG530 and HG520b devices.'
'If the target is vulnerable it allows to read credentials.',
'authors':[
'Fady Mohamed Osman (@fady_osman)',# vulnerability discovery
@@ -18,7 +16,8 @@ class Exploit(exploits.Exploit):
"""
__info__={
'name':'Huawei HG866 Password Cahnge',
'description':'Module exploits password change vulnerability in Huawei HG866 devices. If the target is vulnerable it allows to change administration password.',
'description':'Module exploits password change vulnerability in Huawei HG866 devices.'
'If the target is vulnerable it allows to change administration password.',
@@ -19,10 +17,12 @@ class Exploit(exploits.Exploit):
"""
__info__={
'name':'Linksys E1500/E2500',
'description':'Module exploits remote command execution in Linksys E1500/E2500 devices. Diagnostics interface allows executing root privileged shell commands is available on dedicated web pages on the device.',
'description':'Module exploits remote command execution in Linksys E1500/E2500 devices.'
'Diagnostics interface allows executing root privileged shell commands is '
'available on dedicated web pages on the device.',
'authors':[
'Michael Messner',# vulnerability discovery
'Esteban Rodriguez (n00py)',# routersploit module
'Esteban Rodriguez (n00py)',# routersploit module
],
'references':[
'https://www.exploit-db.com/exploits/24475/',
...
...
@@ -57,9 +57,19 @@ class Exploit(exploits.Exploit):