From 4100f1cfeb9a7c3d5630f8a108406dcc7622078d Mon Sep 17 00:00:00 2001 From: William Vu Date: Mon, 4 Mar 2019 18:22:12 -0600 Subject: [PATCH] Revert vprint_status to vprint_good --- .../modules/exploit/linux/upnp/belkin_wemo_upnp_exec.md | 2 +- modules/exploits/linux/upnp/belkin_wemo_upnp_exec.rb | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/documentation/modules/exploit/linux/upnp/belkin_wemo_upnp_exec.md b/documentation/modules/exploit/linux/upnp/belkin_wemo_upnp_exec.md index 5ef1f46359..74814d4bc3 100644 --- a/documentation/modules/exploit/linux/upnp/belkin_wemo_upnp_exec.md +++ b/documentation/modules/exploit/linux/upnp/belkin_wemo_upnp_exec.md @@ -32,7 +32,7 @@ for Crock-Pot and 49153 for other devices. msf5 exploit(linux/upnp/belkin_wemo_upnp_exec) > run [*] Started reverse TCP handler on 10.22.22.4:4444 -[*] Wemo-enabled device detected +[+] Wemo-enabled device detected [*] Found firmware version: 2.00.6461 [*] 10.22.22.1:49152 - The target appears to be vulnerable. [*] Using URL: http://0.0.0.0:8080/CKgRyLqQZtBY6 diff --git a/modules/exploits/linux/upnp/belkin_wemo_upnp_exec.rb b/modules/exploits/linux/upnp/belkin_wemo_upnp_exec.rb index 71af943c01..8bd88a1aaa 100644 --- a/modules/exploits/linux/upnp/belkin_wemo_upnp_exec.rb +++ b/modules/exploits/linux/upnp/belkin_wemo_upnp_exec.rb @@ -89,7 +89,7 @@ class MetasploitModule < Msf::Exploit::Remote return checkcode end - vprint_status('Wemo-enabled device detected') + vprint_good('Wemo-enabled device detected') checkcode = CheckCode::Detected version = (v = res.get_xml_document.at('firmwareVersion')&.text) &&