diff --git a/modules/exploits/linux/http/roxy_wi_exec.rb b/modules/exploits/linux/http/roxy_wi_exec.rb index 2081e57ca9..f4d0226222 100644 --- a/modules/exploits/linux/http/roxy_wi_exec.rb +++ b/modules/exploits/linux/http/roxy_wi_exec.rb @@ -109,7 +109,7 @@ class MetasploitModule < Msf::Exploit::Remote end def exploit - print_status "Executing #{target.name} for #{datastore['PAYLOAD']}" + print_status("Exploiting...") case target['Type'] when :in_memory execute_command(payload.encoded)