Commit c00f4c3b by Marcin Bury

fixing authors typo

parent 879a8cb1
......@@ -12,7 +12,9 @@ class Exploit(exploits.Exploit):
__info__ = {
'name': 'Asmax AR1004G Password Disclosure',
'description': 'Exploits asmax password disclosure vulnerability that allows to fetch credentials for: Admin, Support and User accounts.',
'author': 'Marcin Bury <marcin.bury@reverse-shell.com>', # routersploit module
'authors': [
'Marcin Bury <marcin.bury@reverse-shell.com>', # routersploit module
],
'references': [
'https://github.com/lucyoa/exploits/blob/master/asmax/asmax.txt'
],
......
......@@ -11,16 +11,18 @@ class Exploit(exploits.Exploit):
If the target is vulnerable it allows to read credentials for admin, support and user."
"""
__info__ = {
'name': 'Comtrend CT 5361T Password Disclosure Vulnerability',
'name': 'Comtrend CT 5361T Password Disclosure',
'description': 'WiFi router Comtrend CT 5361T suffers from a Password Disclosure Vulnerability',
'author': 'TUNISIAN CYBER', # routersploit module,
'authors': [
'TUNISIAN CYBER', # routersploit module,
],
'references': [
'https://packetstormsecurity.com/files/126129/Comtrend-CT-5361T-Password-Disclosure.html'
'https://packetstormsecurity.com/files/126129/Comtrend-CT-5361T-Password-Disclosure.html'
],
'targets': [
'Comtrend CT 5361T (more likely CT 536X)\n' +
'Software Version: A111-312SSG-T02_R01\n' +
'Wireless Driver Version: 4.150.10.15.cpe2.2'
'targets': [
'Comtrend CT 5361T (more likely CT 536X)\n' +
'Software Version: A111-312SSG-T02_R01\n' +
'Wireless Driver Version: 4.150.10.15.cpe2.2'
]
}
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment