From 411e0e196f73aec5c73ed5f754f121cd1ac1bfb3 Mon Sep 17 00:00:00 2001 From: bcoles Date: Wed, 8 Feb 2023 20:02:28 +1100 Subject: [PATCH] 3com_officeconnect_cmd_exec: Fix reference URL (#2705) --- modules/exploits/router/3com_officeconnect_cmd_exec/config.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/exploits/router/3com_officeconnect_cmd_exec/config.yaml b/modules/exploits/router/3com_officeconnect_cmd_exec/config.yaml index e0b458639..9063748a9 100644 --- a/modules/exploits/router/3com_officeconnect_cmd_exec/config.yaml +++ b/modules/exploits/router/3com_officeconnect_cmd_exec/config.yaml @@ -9,7 +9,7 @@ beef: enable: true category: ["Exploits", "Router"] name: "3COM OfficeConnect Command Execution" - description: "Attempts to execute arbitrary commands on a 3Com OfficeConnect ADSL Wireless 11g Firewall Router (OSVDB# 66232).
For more information see, http://www.andreafabrizi.it/?exploits:3com_officeconnect" + description: "Attempts to execute arbitrary commands on a 3Com OfficeConnect ADSL Wireless 11g Firewall Router (OSVDB# 66232).
For more information see, https://www.andreafabrizi.it/2009/10/18/3COM-OfficeConnect-FirewallRouter-multiple-Vulnerabilities/" authors: ["bcoles", "Andrea Fabrizi"] target: working: ["ALL"]