Powered by Blogger.

Blog Archive

Home » » TP-Link Wireless Lite N Access Point Directory Traversal Vulnerability

TP-Link Wireless Lite N Access Point Directory Traversal Vulnerability

Written By Unknown on Wednesday, December 4, 2013 | 8:05 AM

TP-Link Wireless Lite N Access Point Directory Traversal Vulnerability

This module tests whether a directory traversal vulnerability is present in versions of TP-Link Access Point 3.12.16 Build 120228 Rel.37317n.

auxiliary/scanner/http/tplink_traversal_noauth

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':
msf > use auxiliary/scanner/http/tplink_traversal_noauth msf auxiliary(tplink_traversal_noauth) > show actions ...actions... msf auxiliary(tplink_traversal_noauth) > set ACTION <action-name> msf auxiliary(tplink_traversal_noauth) > show options ...show and set options... msf auxiliary(tplink_traversal_noauth) > run
Share this article :

0 comments:

Post a Comment

 
Đăng Kí Học Trực Tuyến : Chương Trình Đào Tạo Security365 | Ethical Haking | SiSSP
Copyright © 2013. An toan thong tin - All Rights Reserved
Web Master @ Nguyen Tran Tuong Vinh
Tech Support @ Bang Tran Ngoc