diff --git a/modules/exploits/router/3com_officeconnect_cmd_exec/config.yaml b/modules/exploits/router/3com_officeconnect_cmd_exec/config.yaml index e0b458639..9063748a9 100644 --- a/modules/exploits/router/3com_officeconnect_cmd_exec/config.yaml +++ b/modules/exploits/router/3com_officeconnect_cmd_exec/config.yaml @@ -9,7 +9,7 @@ beef: enable: true category: ["Exploits", "Router"] name: "3COM OfficeConnect Command Execution" - description: "Attempts to execute arbitrary commands on a 3Com OfficeConnect ADSL Wireless 11g Firewall Router (OSVDB# 66232).
For more information see, http://www.andreafabrizi.it/?exploits:3com_officeconnect" + description: "Attempts to execute arbitrary commands on a 3Com OfficeConnect ADSL Wireless 11g Firewall Router (OSVDB# 66232).
For more information see, https://www.andreafabrizi.it/2009/10/18/3COM-OfficeConnect-FirewallRouter-multiple-Vulnerabilities/" authors: ["bcoles", "Andrea Fabrizi"] target: working: ["ALL"]