This Metasploit module exploits HP Data Protector Omniinet process on Windows only. This exploit invokes the install service function which allows an attacker to create a custom payload in the format of an executable. To ensure this works, the SMB server created in MSF must have a share called Omniback which has a subfolder i386.
3f3ee3bebaadc3f10e4f57cb6e085b314f160caf7c79688ef8fc177c8ea4eea2
HP Data Protector client versions 6.11 and 6.20 suffer from an EXEC_CMD remote code execution vulnerability.
5d34993adf845edd6d894d448162c3ced97c1186b2c7b70f5c29bfbe0a5da886
HP Data Protector Client EXEC_SETUP remote code execution proof of concept exploit.
74be50124dc9e7c705be0e3addd5aeb34b9d814fd5388d581dbc47f14bf3077b