diff --git a/modules/exploits/unix/http/schneider_electric_net55xx_encoder.rb b/modules/exploits/unix/http/schneider_electric_net55xx_encoder.rb index c1ae4c67c1..d16a0dfeb9 100644 --- a/modules/exploits/unix/http/schneider_electric_net55xx_encoder.rb +++ b/modules/exploits/unix/http/schneider_electric_net55xx_encoder.rb @@ -15,10 +15,8 @@ class MetasploitModule < Msf::Exploit::Remote super(update_info(info, 'Name' => "Schneider Electric Pelco Endura NET55XX Encoder", 'Description' => %q{ - This module exploits an inadequate access control vulnerability creating a malicious - json request to the webUI encoder, thus allowing the SSH service to be enabled , and - changing the root password. This module has been tested sucessfully on: NET5501, - NET5501-I, NET5501-XT, NET5504, NET5500,NET5516,NET550 versions. + This module exploits inadequate access controls within the webUI to enable the SSH service and change the root password. + This module has been tested sucessfully on: NET5501, NET5501-I, NET5501-XT, NET5504, NET5500,NET5516,NET550 versions. }, 'License' => MSF_LICENSE, 'Author' =>