# # Copyright (c) 2006-2015 Wade Alcorn - wade@bindshell.net # Browser Exploitation Framework (BeEF) - http://beefproject.com # See the file 'doc/COPYING' for copying permission # beef: module: com_officeconnect_cmd_exec: enable: true category: ["Exploits", "Router"] name: "3COM OfficeConnect Command Execution" description: "Attempts to execute arbitrary commands on a 3Com OfficeConnect ADSL Wireless 11g Firewall Router (OSVDB# 66232).
For more information see, http://www.andreafabrizi.it/?exploits:3com_officeconnect" authors: ["bcoles", "Andrea Fabrizi"] target: working: ["ALL"]