Closed nixawk closed 8 years ago
If you don't known how to use Pocsuite, Please read USAGE documentation.
pocsuite $ python pcs-console.py modules ,--. ,--. ,---. ,---. ,---.,---.,--.,--`--,-' '-.,---. {2.0.2-nongit-20160523} | .-. | .-. | .--( .-'| || ,--'-. .-| .-. : | '-' ' '-' \ `--.-' `' '' | | | | \ --. | |-' `---' `---`----' `----'`--' `--' `----' `--' https://seebug.org Pcs> poc Pcs.poc> avaliable +-------+-------------------------------------------------------+------------+ | pocId | avaliablePocName | Folder | +-------+-------------------------------------------------------+------------+ | 1 | dlink_command_php_exec_noauth | ../modules | +-------+-------------------------------------------------------+------------+ Pcs.poc> load 1 [*] load poc file(s) success! Pcs.poc> exit Pcs> config Pcs.config> url http://xxx.xxx.xxx.xxx Pcs.config> exit Pcs> verify [19:50:10] [*] setting the HTTP timeout [19:50:10] [*] checking dlink_command_php_exec_noauth [19:50:10] [!] missing ['appVersion', 'appPowerLink', 'vulType'] in dlink_command_php_exec_noauth [19:50:10] [*] poc:'dlink_command_php_exec_noauth' target:'http://xxx.xxx.xxx.xxx' [19:50:12] [+] poc-78176 'Multiple Vulnerabilities in D-Link DIR-600 and DIR-300 ' has already been detected against 'http://xxx.xxx.xxx.xxx/command.php'. [19:50:12] [+] URL : http://xxx.xxx.xxx.xxx/command.php +------------------------+-------------------------------+--------+-----------+---------+---------+ | target-url | poc-name | poc-id | component | version | status | +------------------------+-------------------------------+--------+-----------+---------+---------+ | http://xxx.xxx.xxx.xxx | dlink_command_php_exec_noauth | 78176 | D-Link | | success | +------------------------+-------------------------------+--------+-----------+---------+---------+ success : 1 / 1 Pcs> exit
If you don't known how to use Pocsuite, Please read USAGE documentation.