@@ -19,11 +19,11 @@ class Exploit(exploits.Exploit):
'name':'Technicolor DWG-855 Auth Bypass',
'description':'Module exploits Technicolor DWG-855 Authentication Bypass vulnerability which allows changing administrator\'s password.\n\nNOTE: This module will errase previous credentials, this is NOT stealthy.',
'No references, at time of write its a 0day. Check my page though I probably wrote something about it.',
'Bug discovered some time before Aug 2016, this is the first reference to it!\n This exploit works with any POST parameter, but changing admin creds gives you access to everything else.',
],
'devices':[
'Technicolor DWG-855',
...
...
@@ -49,28 +49,28 @@ class Exploit(exploits.Exploit):