From e670169ab585a58ecea1bc08364ab723e8c01031 Mon Sep 17 00:00:00 2001 From: Marcin Bury Date: Sat, 1 Apr 2017 11:49:16 +0100 Subject: [PATCH] Fixing false positive for DLink DVG N5402SP Path Traversal (#220) --- .../modules/exploits/dlink/dvg_n5402sp_path_traversal.py | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/routersploit/modules/exploits/dlink/dvg_n5402sp_path_traversal.py b/routersploit/modules/exploits/dlink/dvg_n5402sp_path_traversal.py index 7c4705a97..5f8788031 100644 --- a/routersploit/modules/exploits/dlink/dvg_n5402sp_path_traversal.py +++ b/routersploit/modules/exploits/dlink/dvg_n5402sp_path_traversal.py @@ -82,10 +82,8 @@ def check(self): # connection response = http_request(method="POST", url=url, data=data) - if response is None: - return False # target is not vulnerable - if "root" in response.text: + if response is not None and "root:" in response.text: return True # target vulnerable return False # target not vulnerable