From 30a7ee1bf20d61c3c59e4bd76aed8a0b8a6a663d Mon Sep 17 00:00:00 2001 From: Grant Willcox Date: Mon, 30 Aug 2021 09:55:07 -0500 Subject: [PATCH] Final very minor documentation fixes for better clarity --- .../exploit/linux/http/geutebruck_cmdinject_cve_2021_335xx.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/documentation/modules/exploit/linux/http/geutebruck_cmdinject_cve_2021_335xx.md b/documentation/modules/exploit/linux/http/geutebruck_cmdinject_cve_2021_335xx.md index 13f14a1200..a88cff0c82 100644 --- a/documentation/modules/exploit/linux/http/geutebruck_cmdinject_cve_2021_335xx.md +++ b/documentation/modules/exploit/linux/http/geutebruck_cmdinject_cve_2021_335xx.md @@ -31,7 +31,7 @@ This module has been tested on a Geutebruck 5.02024 G-Cam EFD-2250 running the l ### Description This module bypasses authentication and exploits multiple authenticated arbitrary command execution -vulnerabilities within various parameters of Geutebruck G-Cam EEC-2xxx and G-Code EBC-21xx, EFD-22xx, +vulnerabilities within the parameters of various pages on Geutebruck G-Cam EEC-2xxx and G-Code EBC-21xx, EFD-22xx, ETHC-22xx, and EWPC-22xx devices running firmware versions <= 1.12.0.27 as well as firmware versions 1.12.13.2 and 1.12.14.5. Successful exploitation results in remote code execution as the `root` user. @@ -47,7 +47,7 @@ at https://www.randorisec.fr/udp-technology-ip-camera-vulnerabilities/. 5. Do: `set rhosts ` 6. Do: `check` to be sure the target is vulnerable 7. Do: `exploit` - 8. You should get a shell + 8. You should get a shell as the `root` user. ## Scenarios ### Geutebruck 5.02024 G-Cam EFD-2250 running firmware version 1.12.0.27.