diff --git a/modules/exploits/linux/http/sophos_wpa_iface_exec.rb b/modules/exploits/linux/http/sophos_wpa_iface_exec.rb index d3ca416414..aa0cd93719 100644 --- a/modules/exploits/linux/http/sophos_wpa_iface_exec.rb +++ b/modules/exploits/linux/http/sophos_wpa_iface_exec.rb @@ -76,7 +76,6 @@ class Metasploit3 < Msf::Exploit::Remote end def exploit - print_status("#{payload.encoded}") init = send_request_cgi({ 'uri' => normalize_uri(target_uri.path, 'index.php') })