From c0377c97c5c0d2117163fdff2cbef57945fbcb60 Mon Sep 17 00:00:00 2001 From: vitorespf Date: Fri, 19 Jul 2019 23:31:10 -0300 Subject: [PATCH] Update schneider_electric_net55xx_encoder.rb --- .../unix/http/schneider_electric_net55xx_encoder.rb | 6 ++---- 1 file changed, 2 insertions(+), 4 deletions(-) diff --git a/modules/exploits/unix/http/schneider_electric_net55xx_encoder.rb b/modules/exploits/unix/http/schneider_electric_net55xx_encoder.rb index c1ae4c67c1..d16a0dfeb9 100644 --- a/modules/exploits/unix/http/schneider_electric_net55xx_encoder.rb +++ b/modules/exploits/unix/http/schneider_electric_net55xx_encoder.rb @@ -15,10 +15,8 @@ class MetasploitModule < Msf::Exploit::Remote super(update_info(info, 'Name' => "Schneider Electric Pelco Endura NET55XX Encoder", 'Description' => %q{ - This module exploits an inadequate access control vulnerability creating a malicious - json request to the webUI encoder, thus allowing the SSH service to be enabled , and - changing the root password. This module has been tested sucessfully on: NET5501, - NET5501-I, NET5501-XT, NET5504, NET5500,NET5516,NET550 versions. + This module exploits inadequate access controls within the webUI to enable the SSH service and change the root password. + This module has been tested sucessfully on: NET5501, NET5501-I, NET5501-XT, NET5504, NET5500,NET5516,NET550 versions. }, 'License' => MSF_LICENSE, 'Author' =>