READ EACH STEP CAREFULLY (It seems a lot of work, but it's simple, and don't require a lot of time), in detail, before providing your willingness to work on the project!
I had to include my request in a separate text file, because it was too long for the field provided by the "[login to view URL]" platform. I also included the script through which the exploiting currently takes place, in the module already configured in Metasploit, and working, and the external module to check the presence of the vulnerability (Remote Command Execution checker). (Archive named "RCE Checker- External [login to view URL]").
Note: The module "[login to view URL]" (Attachment) contained in Metasploit already contains a vulnerability checker. If you prefer, you could just rely on that, ignoring the external module. (External module: convenient, but optional).
Once you have read all my requests carefully, please contact me to give me your opinion, or ask me for clarification.
THEY ARE ACCEPTED ONLY USERS WITH HIGH SKILLS; able to do all the job required, with maximum precision.
If you have any doubts, please contact me, and we will see together your compatibility with the project.
PLEASE, DOWNLOAD ANY FILE ATTACHED. Thanks in advance.
1. Exploit Module: [login to view URL] (Screenshot of the module in execution, with the included options, attached at the bottom of this page).
2. Page related the checker: [login to view URL] (Same Metasploit file, as the previous).
3. Useful tool: [login to view URL]
4. Official github of the External Module, with all the information explained in detail: [login to view URL] (Archive named "RCE Checker- External [login to view URL]")