Add WANem v2.3 command execution exploit module
Add WANem v2.3 command execution
Thanks bcoles! Looking into this!
Nice. Works for me.
Maybe Rex::Text.uri_encode could be used. I haven't tested
A "echo" injection could be used to test if the application is really vulnerable :)
Is it right even when privileges are acquires after exploitation? Compatible payload doesn't require privileges, but not sure if this "true" is fully correct. Anyway not a big concern :P