diff --git a/documentation/modules/exploit/linux/http/geutebruck_cmdinject_cve_2021_335xx.md b/documentation/modules/exploit/linux/http/geutebruck_cmdinject_cve_2021_335xx.md index 13f14a1200..a88cff0c82 100644 --- a/documentation/modules/exploit/linux/http/geutebruck_cmdinject_cve_2021_335xx.md +++ b/documentation/modules/exploit/linux/http/geutebruck_cmdinject_cve_2021_335xx.md @@ -31,7 +31,7 @@ This module has been tested on a Geutebruck 5.02024 G-Cam EFD-2250 running the l ### Description This module bypasses authentication and exploits multiple authenticated arbitrary command execution -vulnerabilities within various parameters of Geutebruck G-Cam EEC-2xxx and G-Code EBC-21xx, EFD-22xx, +vulnerabilities within the parameters of various pages on Geutebruck G-Cam EEC-2xxx and G-Code EBC-21xx, EFD-22xx, ETHC-22xx, and EWPC-22xx devices running firmware versions <= 1.12.0.27 as well as firmware versions 1.12.13.2 and 1.12.14.5. Successful exploitation results in remote code execution as the `root` user. @@ -47,7 +47,7 @@ at https://www.randorisec.fr/udp-technology-ip-camera-vulnerabilities/. 5. Do: `set rhosts ` 6. Do: `check` to be sure the target is vulnerable 7. Do: `exploit` - 8. You should get a shell + 8. You should get a shell as the `root` user. ## Scenarios ### Geutebruck 5.02024 G-Cam EFD-2250 running firmware version 1.12.0.27.