# beef: module: farsite_X25_remote_shell: enable: true category: "Exploits" name: "Farsite X25 gateway remote code execution" description: "This module exploits CVE-2014-7175 to write a payload to the router and CVE-2014-7173 to execute it. Once you have shell you can use the setuid /http/bin/execCmd to execute commands as root." authors: ["Wireghoul"] target: working: ["All"]