Files
beef/modules/exploits/farsite_x25_remote_shell/config.yaml
2016-09-15 02:24:18 -04:00

13 lines
473 B
YAML

#
beef:
module:
farsite_X25_remote_shell:
enable: true
category: "Exploits"
name: "Farsite X25 gateway remote code execution"
description: "This module exploits CVE-2014- to write a payload to the router and CVE-2014- to execute it. Once you have shell you can use the setuid /http/bin/execCmd to execute commands as root."
authors: ["Wireghoul"]
target:
working: ["All"]