D-Link DNS-320L...

- AV AC AU C I A
发布: 2018-01-05
修订: 2025-04-13

This Metasploit module exploits two issues. The first issue is that there is a hard coded backdoor within DNS-320L devices. Using this backdoor access we can then reach buggy code which is vulnerable to command injection. Root shell will be spawned upon successful exploitation. Firmware versions 1.0 (2012/6/15) to 6.0 (2015/07/28) are vulnerable.

0%
当前有1条漏洞利用/PoC
当前有0条受影响产品信息