This Metasploit module uses the FreeSWITCH event socket
interface to execute system commands using the system API command.
The event socket service is enabled by default and listens on TCP
port 8021 on the local network interface. This module has been
tested successfully on FreeSWITCH versions: 1.6.10-17-726448d~44bit
on FreeSWITCH-Deb8-TechPreview virtual machine; 1.8.4~64bit on
Ubuntu 19.04 (x64); and 1.10.1~64bit on Windows 7 SP1 (EN)
(x64).
Read more https://packetstormsecurity.com/files/155342/freeswitch_event_socket_cmd_exec.rb.txt