Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
beefproject
GitHub Repository: beefproject/beef
Path: blob/master/modules/exploits/farsite_x25_remote_shell/config.yaml
1154 views
1
#
2
beef:
3
module:
4
farsite_X25_remote_shell:
5
enable: true
6
category: "Exploits"
7
name: "Farsite X25 gateway remote code execution"
8
description: "This module exploits CVE-2014-7175 to write a payload to the router and CVE-2014-7173 to execute it. Once you have shell you can use the setuid /http/bin/execCmd to execute commands as root."
9
authors: ["Wireghoul"]
10
target:
11
working: ["All"]
12
13
14