@@ -13,21 +17,21 @@ class Exploit(exploits.Exploit):
'name':'2Wire Gateway Auth Bypass',
'description':'Module exploits 2Wire Gateway authentication bypass vulnerability. If the target is vulnerable link to bypass authentication is provided.',
'description':'Module exploits Asmax AR 804 Remote Code Execution vulnerability which allows executing command on operating system level with root privileges.',
'references':[
...
...
@@ -27,7 +33,7 @@ class Exploit(exploits.Exploit):
port=exploits.Option(80,'Target Port')
defrun(self):
ifself.check()==True:
ifself.check()isTrue:
print_success("Target is vulnerable")
print_status("Invoking command loop...")
self.command_loop()
...
...
@@ -65,4 +71,3 @@ class Exploit(exploits.Exploit):
@@ -13,9 +19,9 @@ class Exploit(exploits.Exploit):
'name':'Belkin G & N150 Password Disclosure',
'description':'Module exploits Belkin G and N150 Password MD5 Disclosure vulnerability which allows fetching administration\'s password in md5 format',
@@ -13,8 +19,8 @@ class Exploit(exploits.Exploit):
'name':'Belkin G Info Disclosure',
'description':'Module exploits Belkin Wireless G Plus MIMO Router F5D9230-4 information disclosure vulnerability which allows fetching sensitive information such as credentials.',
'description':'Module exploits authentication bypass vulnerability in D-Link DIR-300, DIR-320, DIR-615 revD devices. It is possible to access administration panel without providing password.',
@@ -13,21 +19,21 @@ class Exploit(exploits.Exploit):
'name':'D-Link DIR-300 & DIR-600 & DIR-615 Info Disclosure',
'description':'Module explois information disclosure vulnerability in D-Link DIR-300, DIR-600, DIR-615 devices. It is possible to retrieve sensitive information such as credentials.',
@@ -12,8 +18,8 @@ class Exploit(exploits.Exploit):
'name':'D-LINK DIR-300 & DIR-600 RCE',
'description':'Module exploits D-Link DIR-300, DIR-600 Remote Code Execution vulnerability which allows executing command on operating system level with root privileges.',
@@ -13,19 +20,19 @@ class Exploit(exploits.Exploit):
'name':'D-Link DWR-932 Info Disclosure',
'description':'Module explois information disclosure vulnerability in D-Link DWR-932 devices. It is possible to retrieve sensitive information such as credentials.',
@@ -13,8 +19,8 @@ class Exploit(exploits.Exploit):
'name':'Linksys WAP54Gv3',
'description':'Module exploits remote command execution in Linksys WAP54Gv3 devices. Debug interface allows executing root privileged shell commands is available on dedicated web pages on the device.',
@@ -13,19 +17,19 @@ class Exploit(exploits.Exploit):
'name':'Netgear N300 Auth Bypass',
'description':'Module exploits authentication bypass vulnerability in Netgear N300 devices. It is possible to access administration panel without providing password.',