Final very minor documentation fixes for better clarity
This commit is contained in:
@@ -31,7 +31,7 @@ This module has been tested on a Geutebruck 5.02024 G-Cam EFD-2250 running the l
|
||||
### Description
|
||||
|
||||
This module bypasses authentication and exploits multiple authenticated arbitrary command execution
|
||||
vulnerabilities within various parameters of Geutebruck G-Cam EEC-2xxx and G-Code EBC-21xx, EFD-22xx,
|
||||
vulnerabilities within the parameters of various pages on Geutebruck G-Cam EEC-2xxx and G-Code EBC-21xx, EFD-22xx,
|
||||
ETHC-22xx, and EWPC-22xx devices running firmware versions <= 1.12.0.27 as well as firmware
|
||||
versions 1.12.13.2 and 1.12.14.5. Successful exploitation results in remote code execution as the `root` user.
|
||||
|
||||
@@ -47,7 +47,7 @@ at https://www.randorisec.fr/udp-technology-ip-camera-vulnerabilities/.
|
||||
5. Do: `set rhosts <camera_ip>`
|
||||
6. Do: `check` to be sure the target is vulnerable
|
||||
7. Do: `exploit`
|
||||
8. You should get a shell
|
||||
8. You should get a shell as the `root` user.
|
||||
|
||||
## Scenarios
|
||||
### Geutebruck 5.02024 G-Cam EFD-2250 running firmware version 1.12.0.27.
|
||||
|
||||
Reference in New Issue
Block a user