diff --git a/modules/exploits/router/3com_officeconnect_cmd_exec/config.yaml b/modules/exploits/router/3com_officeconnect_cmd_exec/config.yaml
index e0b458639..9063748a9 100644
--- a/modules/exploits/router/3com_officeconnect_cmd_exec/config.yaml
+++ b/modules/exploits/router/3com_officeconnect_cmd_exec/config.yaml
@@ -9,7 +9,7 @@ beef:
enable: true
category: ["Exploits", "Router"]
name: "3COM OfficeConnect Command Execution"
- description: "Attempts to execute arbitrary commands on a 3Com OfficeConnect ADSL Wireless 11g Firewall Router (OSVDB# 66232).
For more information see, http://www.andreafabrizi.it/?exploits:3com_officeconnect"
+ description: "Attempts to execute arbitrary commands on a 3Com OfficeConnect ADSL Wireless 11g Firewall Router (OSVDB# 66232).
For more information see, https://www.andreafabrizi.it/2009/10/18/3COM-OfficeConnect-FirewallRouter-multiple-Vulnerabilities/"
authors: ["bcoles", "Andrea Fabrizi"]
target:
working: ["ALL"]