Commit e670169a by Marcin Bury Committed by Mariusz Kupidura

Fixing false positive for DLink DVG N5402SP Path Traversal (#220)

parent 25fccd8c
...@@ -82,10 +82,8 @@ class Exploit(exploits.Exploit): ...@@ -82,10 +82,8 @@ class Exploit(exploits.Exploit):
# connection # connection
response = http_request(method="POST", url=url, data=data) response = http_request(method="POST", url=url, data=data)
if response is None:
return False # target is not vulnerable
if "root" in response.text: if response is not None and "root:" in response.text:
return True # target vulnerable return True # target vulnerable
return False # target not vulnerable return False # target not vulnerable
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment