Land #11516, reverted print for Wemo exploit
This commit is contained in:
@@ -32,7 +32,7 @@ for Crock-Pot and 49153 for other devices.
|
||||
msf5 exploit(linux/upnp/belkin_wemo_upnp_exec) > run
|
||||
|
||||
[*] Started reverse TCP handler on 10.22.22.4:4444
|
||||
[*] Wemo-enabled device detected
|
||||
[+] Wemo-enabled device detected
|
||||
[*] Found firmware version: 2.00.6461
|
||||
[*] 10.22.22.1:49152 - The target appears to be vulnerable.
|
||||
[*] Using URL: http://0.0.0.0:8080/CKgRyLqQZtBY6
|
||||
|
||||
@@ -89,7 +89,7 @@ class MetasploitModule < Msf::Exploit::Remote
|
||||
return checkcode
|
||||
end
|
||||
|
||||
vprint_status('Wemo-enabled device detected')
|
||||
vprint_good('Wemo-enabled device detected')
|
||||
checkcode = CheckCode::Detected
|
||||
|
||||
version = (v = res.get_xml_document.at('firmwareVersion')&.text) &&
|
||||
|
||||
Reference in New Issue
Block a user