Files
beef/modules/exploits/router/ddwrt_v24_sp1_cmd_exec/config.yaml
jcrew99 486a9bb329 Update copyright 2023 (#2675)
* updated copyright

* reverted gemfile lock changes
2022-12-31 15:36:07 +10:00

19 lines
749 B
YAML

#
# Copyright (c) 2006-2023 Wade Alcorn - wade@bindshell.net
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
beef:
module:
ddwrt_v24_sp1_cmd_exec:
enable: true
category: ['Exploits', 'Router']
name: 'DD-WRT v24 SP1 Command Execution'
description: 'DD-WRT v24 SP1 fails to properly handle metacharacters in the
HTTP management interface. This module abuses that flaw by injecting
metacharacters to allow an unauthenticated attacker to execute arbitrary
commands as the root user.'
authors: ['soh_cah_toa']
target:
working: ['ALL']