Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
R
routersploit
Overview
Overview
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
czos-dpend
routersploit
Commits
23b38673
Commit
23b38673
authored
May 10, 2016
by
Marcin Bury
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Switching mail address to [at].
parent
af3f6918
Hide whitespace changes
Inline
Side-by-side
Showing
3 changed files
with
4 additions
and
4 deletions
+4
-4
ar_1004g_password_disclosure.py
...it/modules/exploits/asmax/ar_1004g_password_disclosure.py
+1
-1
ar_804_gu_rce.py
routersploit/modules/exploits/asmax/ar_804_gu_rce.py
+2
-2
rt_n16_password_disclosure.py
...ploit/modules/exploits/asus/rt_n16_password_disclosure.py
+1
-1
No files found.
routersploit/modules/exploits/asmax/ar_1004g_password_disclosure.py
View file @
23b38673
...
...
@@ -22,7 +22,7 @@ class Exploit(exploits.Exploit):
'description'
:
'Exploits asmax password disclosure vulnerability that allows to '
'fetch credentials for: Admin, Support and User accounts.'
,
'authors'
:
[
'Marcin Bury <marcin.bury
@
reverse-shell.com>'
,
# routersploit module
'Marcin Bury <marcin.bury
[at]
reverse-shell.com>'
,
# routersploit module
],
'references'
:
[
'https://github.com/lucyoa/exploits/blob/master/asmax/asmax.txt'
,
...
...
routersploit/modules/exploits/asmax/ar_804_gu_rce.py
View file @
23b38673
...
...
@@ -20,8 +20,8 @@ class Exploit(exploits.Exploit):
__info__
=
{
'name'
:
'Asmax AR 804 RCE'
,
'authors'
:
[
'Michal Sajdak <michal.sajdak
@
securitum.com>'
,
# vulnerability discovery
'Marcin Bury <marcin.bury
@
reverse-shell.com>'
,
# routersploit module
'Michal Sajdak <michal.sajdak
[at]
securitum.com>'
,
# vulnerability discovery
'Marcin Bury <marcin.bury
[at]
reverse-shell.com>'
,
# routersploit module
],
'description'
:
'Module exploits Asmax AR 804 Remote Code Execution vulnerability which allows executing command on operating system level with root privileges.'
,
'references'
:
[
...
...
routersploit/modules/exploits/asus/rt_n16_password_disclosure.py
View file @
23b38673
...
...
@@ -21,7 +21,7 @@ class Exploit(exploits.Exploit):
'description'
:
'Module exploits password disclosure vulnerability in Asus RT-N16 devices that allows to fetch credentials for the device.'
,
'authors'
:
[
'Harry Sintonen'
,
# vulnerability discovery
'Marcin Bury <marcin.bury
@
reverse-shell.com>'
,
# routersploit module
'Marcin Bury <marcin.bury
[at]
reverse-shell.com>'
,
# routersploit module
],
'references'
:
[
'https://sintonen.fi/advisories/asus-router-auth-bypass.txt'
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment