Final very minor documentation fixes for better clarity

This commit is contained in:
Grant Willcox
2021-08-30 09:55:07 -05:00
parent cd74e34e3c
commit 30a7ee1bf2
@@ -31,7 +31,7 @@ This module has been tested on a Geutebruck 5.02024 G-Cam EFD-2250 running the l
### Description
This module bypasses authentication and exploits multiple authenticated arbitrary command execution
vulnerabilities within various parameters of Geutebruck G-Cam EEC-2xxx and G-Code EBC-21xx, EFD-22xx,
vulnerabilities within the parameters of various pages on Geutebruck G-Cam EEC-2xxx and G-Code EBC-21xx, EFD-22xx,
ETHC-22xx, and EWPC-22xx devices running firmware versions <= 1.12.0.27 as well as firmware
versions 1.12.13.2 and 1.12.14.5. Successful exploitation results in remote code execution as the `root` user.
@@ -47,7 +47,7 @@ at https://www.randorisec.fr/udp-technology-ip-camera-vulnerabilities/.
5. Do: `set rhosts <camera_ip>`
6. Do: `check` to be sure the target is vulnerable
7. Do: `exploit`
8. You should get a shell
8. You should get a shell as the `root` user.
## Scenarios
### Geutebruck 5.02024 G-Cam EFD-2250 running firmware version 1.12.0.27.