Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
R
routersploit
Overview
Overview
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
czos-dpend
routersploit
Commits
e0393dff
Commit
e0393dff
authored
9 years ago
by
Marcin Bury
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Info targets replaced with devices.
parent
af188ee4
Hide whitespace changes
Inline
Side-by-side
Showing
32 changed files
with
35 additions
and
38 deletions
+35
-38
README.md
README.md
+1
-1
interpreter.py
routersploit/interpreter.py
+1
-1
gateway_auth_bypass.py
routersploit/modules/exploits/2wire/gateway_auth_bypass.py
+1
-1
ar_1004g_password_disclosure.py
...it/modules/exploits/asmax/ar_1004g_password_disclosure.py
+1
-1
ar_804_gu_rce.py
routersploit/modules/exploits/asmax/ar_804_gu_rce.py
+1
-1
infosvr_backdoor_rce.py
routersploit/modules/exploits/asus/infosvr_backdoor_rce.py
+1
-1
rt_n16_password_disclosure.py
...ploit/modules/exploits/asus/rt_n16_password_disclosure.py
+1
-1
g_n150_password_disclosure.py
...oit/modules/exploits/belkin/g_n150_password_disclosure.py
+1
-1
g_plus_info_disclosure.py
...rsploit/modules/exploits/belkin/g_plus_info_disclosure.py
+1
-1
n150_path_traversal.py
routersploit/modules/exploits/belkin/n150_path_traversal.py
+1
-1
n750_rce.py
routersploit/modules/exploits/belkin/n750_rce.py
+1
-1
ucs_manager_rce.py
routersploit/modules/exploits/cisco/ucs_manager_rce.py
+1
-1
ct_5361t_password_disclosure.py
...modules/exploits/comtrend/ct_5361t_password_disclosure.py
+2
-4
dir_300_320_615_auth_bypass.py
...oit/modules/exploits/dlink/dir_300_320_615_auth_bypass.py
+1
-1
dir_300_600_615_info_disclosure.py
...modules/exploits/dlink/dir_300_600_615_info_disclosure.py
+1
-1
dir_300_600_rce.py
routersploit/modules/exploits/dlink/dir_300_600_rce.py
+1
-1
dir_645_password_disclosure.py
...oit/modules/exploits/dlink/dir_645_password_disclosure.py
+1
-1
dns_320l_327l_rce.py
routersploit/modules/exploits/dlink/dns_320l_327l_rce.py
+1
-1
dsl_2750b_info_disclosure.py
...ploit/modules/exploits/dlink/dsl_2750b_info_disclosure.py
+1
-1
dvg_n5402sp_path_traversal.py
...loit/modules/exploits/dlink/dvg_n5402sp_path_traversal.py
+1
-1
dwr_932_info_disclosure.py
...rsploit/modules/exploits/dlink/dwr_932_info_disclosure.py
+1
-1
fortigate_os_backdoor.py
...sploit/modules/exploits/fortinet/fortigate_os_backdoor.py
+1
-1
screenos_backdoor.py
routersploit/modules/exploits/juniper/screenos_backdoor.py
+1
-1
1500_2500_rce.py
routersploit/modules/exploits/linksys/1500_2500_rce.py
+1
-1
wap54gv3_rce.py
routersploit/modules/exploits/linksys/wap54gv3_rce.py
+1
-1
misfortune_cookie.py
routersploit/modules/exploits/multi/misfortune_cookie.py
+1
-1
multi_rce.py
routersploit/modules/exploits/netgear/multi_rce.py
+1
-1
n300_auth_bypass.py
routersploit/modules/exploits/netgear/n300_auth_bypass.py
+1
-1
prosafe_rce.py
routersploit/modules/exploits/netgear/prosafe_rce.py
+1
-1
tc7200_password_disclosure.py
...odules/exploits/technicolor/tc7200_password_disclosure.py
+1
-1
airos_6_x.py
routersploit/modules/exploits/ubiquiti/airos_6_x.py
+2
-3
test_interpreter.py
routersploit/test/test_interpreter.py
+2
-2
No files found.
README.md
View file @
e0393dff
...
...
@@ -126,7 +126,7 @@ Display information about exploit:
Description:
Module exploits D-Link DIR-300, DIR-600 Remote Code Execution vulnerability which allows executing command on operating system level with root privileges.
Target
s:
Device
s:
- D-Link DIR 300
- D-Link DIR 600
...
...
This diff is collapsed.
Click to expand it.
routersploit/interpreter.py
View file @
e0393dff
...
...
@@ -336,7 +336,7 @@ class RoutersploitInterpreter(BaseInterpreter):
if
sub_command
==
info
:
utils
.
pprint_dict_in_order
(
self
.
module_metadata
,
(
"name"
,
"description"
,
"
target
s"
,
"authors"
,
"references"
),
(
"name"
,
"description"
,
"
device
s"
,
"authors"
,
"references"
),
)
utils
.
print_info
()
elif
sub_command
==
options
:
...
...
This diff is collapsed.
Click to expand it.
routersploit/modules/exploits/2wire/gateway_auth_bypass.py
View file @
e0393dff
...
...
@@ -23,7 +23,7 @@ class Exploit(exploits.Exploit):
'references'
:
[
'https://www.exploit-db.com/exploits/9459/'
,
],
'
target
s'
:
[
'
device
s'
:
[
'2Wire 2701HGV-W'
,
'2Wire 3800HGV-B'
,
'2Wire 3801HGV'
,
...
...
This diff is collapsed.
Click to expand it.
routersploit/modules/exploits/asmax/ar_1004g_password_disclosure.py
View file @
e0393dff
...
...
@@ -27,7 +27,7 @@ class Exploit(exploits.Exploit):
'references'
:
[
'https://github.com/lucyoa/exploits/blob/master/asmax/asmax.txt'
,
],
'
target
s'
:
[
'
device
s'
:
[
'Asmax AR 1004g'
,
],
}
...
...
This diff is collapsed.
Click to expand it.
routersploit/modules/exploits/asmax/ar_804_gu_rce.py
View file @
e0393dff
...
...
@@ -28,7 +28,7 @@ class Exploit(exploits.Exploit):
'http://www.securitum.pl/dh/asmax-ar-804-gu-compromise'
,
'https://www.exploit-db.com/exploits/8846/'
,
],
'
target
s'
:
[
'
device
s'
:
[
'Asmax AR 804 gu'
,
],
}
...
...
This diff is collapsed.
Click to expand it.
routersploit/modules/exploits/asus/infosvr_backdoor_rce.py
View file @
e0393dff
...
...
@@ -28,7 +28,7 @@ class Exploit(exploits.Exploit):
'references'
:
[
'https://github.com/jduck/asus-cmd'
,
],
'
target
s'
:
[
'
device
s'
:
[
'ASUS RT-N66U'
,
'ASUS RT-AC87U'
,
'ASUS RT-N56U'
,
...
...
This diff is collapsed.
Click to expand it.
routersploit/modules/exploits/asus/rt_n16_password_disclosure.py
View file @
e0393dff
...
...
@@ -26,7 +26,7 @@ class Exploit(exploits.Exploit):
'references'
:
[
'https://sintonen.fi/advisories/asus-router-auth-bypass.txt'
],
'
target
s'
:
[
'
device
s'
:
[
'ASUS RT-N10U, firmware 3.0.0.4.374_168'
,
'ASUS RT-N56U, firmware 3.0.0.4.374_979'
,
'ASUS DSL-N55U, firmware 3.0.0.4.374_1397'
,
...
...
This diff is collapsed.
Click to expand it.
routersploit/modules/exploits/belkin/g_n150_password_disclosure.py
View file @
e0393dff
...
...
@@ -28,7 +28,7 @@ class Exploit(exploits.Exploit):
'http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2765'
,
'https://www.exploit-db.com/exploits/17349/'
,
],
'
target
s'
:
[
'
device
s'
:
[
'Belkin G'
,
'Belkin N150'
,
],
...
...
This diff is collapsed.
Click to expand it.
routersploit/modules/exploits/belkin/g_plus_info_disclosure.py
View file @
e0393dff
...
...
@@ -27,7 +27,7 @@ class Exploit(exploits.Exploit):
'http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0403'
,
'https://www.exploit-db.com/exploits/4941/'
,
],
'
target
s'
:
[
'
device
s'
:
[
'Belkin G'
,
],
}
...
...
This diff is collapsed.
Click to expand it.
routersploit/modules/exploits/belkin/n150_path_traversal.py
View file @
e0393dff
...
...
@@ -26,7 +26,7 @@ class Exploit(exploits.Exploit):
'http://www.belkin.com/us/support-article?articleNum=109400'
,
'http://www.kb.cert.org/vuls/id/774788'
,
],
'
target
s'
:
[
'
device
s'
:
[
'Belkin N150 1.00.07'
,
'Belkin N150 1.00.08'
,
'Belkin N150 1.00.09'
,
...
...
This diff is collapsed.
Click to expand it.
routersploit/modules/exploits/belkin/n750_rce.py
View file @
e0393dff
...
...
@@ -27,7 +27,7 @@ class Exploit(exploits.Exploit):
'https://www.exploit-db.com/exploits/35184/'
,
'https://labs.integrity.pt/articles/from-0-day-to-exploit-buffer-overflow-in-belkin-n750-cve-2014-1635/'
,
],
'
target
s'
:
[
'
device
s'
:
[
'Belkin N750'
,
]
}
...
...
This diff is collapsed.
Click to expand it.
routersploit/modules/exploits/cisco/ucs_manager_rce.py
View file @
e0393dff
...
...
@@ -28,7 +28,7 @@ class Exploit(exploits.Exploit):
'https://www.exploit-db.com/exploits/39568/'
,
'https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash'
,
],
'
target
s'
:
[
'
device
s'
:
[
'Cisco UCS Manager 2.1 (1b)'
,
],
}
...
...
This diff is collapsed.
Click to expand it.
routersploit/modules/exploits/comtrend/ct_5361t_password_disclosure.py
View file @
e0393dff
...
...
@@ -27,10 +27,8 @@ class Exploit(exploits.Exploit):
'references'
:
[
'https://packetstormsecurity.com/files/126129/Comtrend-CT-5361T-Password-Disclosure.html'
],
'targets'
:
[
'Comtrend CT 5361T (more likely CT 536X)
\n
'
+
'Software Version: A111-312SSG-T02_R01
\n
'
+
'Wireless Driver Version: 4.150.10.15.cpe2.2'
'devices'
:
[
'Comtrend CT 5361T (more likely CT 536X)'
,
]
}
...
...
This diff is collapsed.
Click to expand it.
routersploit/modules/exploits/dlink/dir_300_320_615_auth_bypass.py
View file @
e0393dff
...
...
@@ -24,7 +24,7 @@ class Exploit(exploits.Exploit):
'references'
:
[
'http://www.devttys0.com/wp-content/uploads/2010/12/dlink_php_vulnerability.pdf'
,
],
'
target
s'
:
[
'
device
s'
:
[
'D-Link DIR-300'
,
'D-Link DIR-600'
,
'D-Link DIR-615 revD'
,
...
...
This diff is collapsed.
Click to expand it.
routersploit/modules/exploits/dlink/dir_300_600_615_info_disclosure.py
View file @
e0393dff
...
...
@@ -26,7 +26,7 @@ class Exploit(exploits.Exploit):
'references'
:
[
'http://seclists.org/bugtraq/2013/Dec/11'
],
'
target
s'
:
[
'
device
s'
:
[
'D-Link DIR-300 (all)'
,
'D-Link DIR-600 (all)'
,
'D-Link DIR-615 (fw 4.0)'
,
...
...
This diff is collapsed.
Click to expand it.
routersploit/modules/exploits/dlink/dir_300_600_rce.py
View file @
e0393dff
...
...
@@ -27,7 +27,7 @@ class Exploit(exploits.Exploit):
'http://www.s3cur1ty.de/home-network-horror-days'
,
'http://www.s3cur1ty.de/m1adv2013-003'
,
],
'
target
s'
:
[
'
device
s'
:
[
'D-Link DIR 300'
,
'D-Link DIR 600'
,
]
...
...
This diff is collapsed.
Click to expand it.
routersploit/modules/exploits/dlink/dir_645_password_disclosure.py
View file @
e0393dff
...
...
@@ -26,7 +26,7 @@ class Exploit(exploits.Exploit):
'references'
:
[
'https://packetstormsecurity.com/files/120591/dlinkdir645-bypass.txt'
],
'
target
s'
:
[
'
device
s'
:
[
'D-Link DIR-645 (Versions < 1.03)'
,
]
}
...
...
This diff is collapsed.
Click to expand it.
routersploit/modules/exploits/dlink/dns_320l_327l_rce.py
View file @
e0393dff
...
...
@@ -28,7 +28,7 @@ class Exploit(exploits.Exploit):
'references'
:
[
'http://www.search-lab.hu/media/D-Link_Security_advisory_3_0_public.pdf'
,
],
'
target
s'
:
[
'
device
s'
:
[
'DNS-320L 1.03b04'
,
'DNS-327L, 1.02'
,
]
...
...
This diff is collapsed.
Click to expand it.
routersploit/modules/exploits/dlink/dsl_2750b_info_disclosure.py
View file @
e0393dff
...
...
@@ -28,7 +28,7 @@ class Exploit(exploits.Exploit):
'references'
:
[
'http://seclists.org/fulldisclosure/2015/May/129'
],
'
target
s'
:
[
'
device
s'
:
[
'D-Link DSL-2750B EU_1.01'
,
],
}
...
...
This diff is collapsed.
Click to expand it.
routersploit/modules/exploits/dlink/dvg_n5402sp_path_traversal.py
View file @
e0393dff
...
...
@@ -25,7 +25,7 @@ class Exploit(exploits.Exploit):
'https://www.exploit-db.com/exploits/39409/'
,
'http://ipositivesecurity.blogspot.com/2016/02/dlink-dvgn5402sp-multiple-vuln.html'
,
],
'
target
s'
:
[
'
device
s'
:
[
'D-Link DVG-N5402SP'
,
]
}
...
...
This diff is collapsed.
Click to expand it.
routersploit/modules/exploits/dlink/dwr_932_info_disclosure.py
View file @
e0393dff
...
...
@@ -27,7 +27,7 @@ class Exploit(exploits.Exploit):
'references'
:
[
'https://www.exploit-db.com/exploits/39581/'
,
],
'
target
s'
:
[
'
device
s'
:
[
'D-Link DWR-932'
,
]
}
...
...
This diff is collapsed.
Click to expand it.
routersploit/modules/exploits/fortinet/fortigate_os_backdoor.py
View file @
e0393dff
...
...
@@ -33,7 +33,7 @@ class Exploit(exploits.Exploit):
'http://www.s3cur1ty.de/home-network-horror-days'
,
'http://www.s3cur1ty.de/m1adv2013-003'
,
],
'
target
s'
:
[
'
device
s'
:
[
'FortiGate OS Version 4.x-5.0.7'
,
]
}
...
...
This diff is collapsed.
Click to expand it.
routersploit/modules/exploits/juniper/screenos_backdoor.py
View file @
e0393dff
...
...
@@ -23,7 +23,7 @@ class Exploit(exploits.Exploit):
'references'
:
[
'https://community.rapid7.com/community/infosec/blog/2015/12/20/cve-2015-7755-juniper-screenos-authentication-backdoor'
,
],
'
target
s'
:
[
'
device
s'
:
[
'Juniper ScreenOS 6.2.0r15 to 6.2.0r18'
,
'Juniper ScreenOS 6.3.0r12 to 6.3.0r20'
,
]
...
...
This diff is collapsed.
Click to expand it.
routersploit/modules/exploits/linksys/1500_2500_rce.py
View file @
e0393dff
...
...
@@ -27,7 +27,7 @@ class Exploit(exploits.Exploit):
'references'
:
[
'https://www.exploit-db.com/exploits/24475/'
,
],
'
target
s'
:
[
'
device
s'
:
[
'Linksys E1500/E2500'
,
]
}
...
...
This diff is collapsed.
Click to expand it.
routersploit/modules/exploits/linksys/wap54gv3_rce.py
View file @
e0393dff
...
...
@@ -27,7 +27,7 @@ class Exploit(exploits.Exploit):
'references'
:
[
'http://seclists.org/bugtraq/2010/Jun/93'
,
],
'
target
s'
:
[
'
device
s'
:
[
'Linksys WAP54Gv3'
,
]
}
...
...
This diff is collapsed.
Click to expand it.
routersploit/modules/exploits/multi/misfortune_cookie.py
View file @
e0393dff
...
...
@@ -25,7 +25,7 @@ class Exploit(exploits.Exploit):
'references'
:
[
'http://mis.fortunecook.ie/'
],
'
target
s'
:
[
'
device
s'
:
[
'multi'
]
}
...
...
This diff is collapsed.
Click to expand it.
routersploit/modules/exploits/netgear/multi_rce.py
View file @
e0393dff
...
...
@@ -28,7 +28,7 @@ class Exploit(exploits.Exploit):
'http://firmware.re/vulns/acsa-2015-001.php'
,
'https://www.blackhat.com/docs/asia-16/materials/asia-16-Costin-Automated-Dynamic-Firmware-Analysis-At-Scale-A-Case-Study-On-Embedded-Web-Interfaces.pdf'
,
],
'
target
s'
:
[
'
device
s'
:
[
'Netgear WG102'
,
'Netgear WG103'
,
'Netgear WN604'
,
...
...
This diff is collapsed.
Click to expand it.
routersploit/modules/exploits/netgear/n300_auth_bypass.py
View file @
e0393dff
...
...
@@ -24,7 +24,7 @@ class Exploit(exploits.Exploit):
'https://www.compass-security.com/fileadmin/Datein/Research/Advisories/CSNC-2015-007_Netgear_WNR1000v4_AuthBypass.txt'
,
'http://www.shellshocklabs.com/2015/09/part-1en-hacking-netgear-jwnr2010v5.html'
,
],
'
target
s'
:
[
'
device
s'
:
[
'Netgear N300'
,
'Netgear JNR1010v2'
,
'Netgear JNR3000'
,
...
...
This diff is collapsed.
Click to expand it.
routersploit/modules/exploits/netgear/prosafe_rce.py
View file @
e0393dff
...
...
@@ -28,7 +28,7 @@ class Exploit(exploits.Exploit):
'http://firmware.re/vulns/acsa-2015-002.php'
,
'https://www.blackhat.com/docs/asia-16/materials/asia-16-Costin-Automated-Dynamic-Firmware-Analysis-At-Scale-A-Case-Study-On-Embedded-Web-Interfaces.pdf'
,
],
'
target
s'
:
[
'
device
s'
:
[
'Netgear ProSafe WC9500'
,
'Netgear ProSafe WC7600'
,
'Netgear ProSafe WC7520'
,
...
...
This diff is collapsed.
Click to expand it.
routersploit/modules/exploits/technicolor/tc7200_password_disclosure.py
View file @
e0393dff
...
...
@@ -23,7 +23,7 @@ class Exploit(exploits.Exploit):
'references'
:
[
'https://www.exploit-db.com/exploits/31894/'
,
],
'
target
s'
:
[
'
device
s'
:
[
'Technicolor TC7200'
,
]
}
...
...
This diff is collapsed.
Click to expand it.
routersploit/modules/exploits/ubiquiti/airos_6_x.py
View file @
e0393dff
...
...
@@ -31,7 +31,7 @@ class Exploit(exploits.Exploit):
'https://www.exploit-db.com/exploits/39701/'
],
'
target
s'
:
[
'
device
s'
:
[
'AirOS 6.x'
]
}
...
...
@@ -163,4 +163,4 @@ class Exploit(exploits.Exploit):
return
True
else
:
return
False
\ No newline at end of file
return
False
This diff is collapsed.
Click to expand it.
routersploit/test/test_interpreter.py
View file @
e0393dff
...
...
@@ -290,7 +290,7 @@ class RoutersploitInterpreterTest(unittest.TestCase):
@mock.patch
(
'__builtin__.print'
)
def
test_command_show_info
(
self
,
mock_print
):
metadata
=
{
'
target
s'
:
'target_desc'
,
'
device
s'
:
'target_desc'
,
'authors'
:
'authors_desc'
,
'references'
:
'references_desc'
,
'description'
:
'description_desc'
,
...
...
@@ -308,7 +308,7 @@ class RoutersploitInterpreterTest(unittest.TestCase):
mock
.
call
(
'name_desc'
),
mock
.
call
(
'
\n
Description:'
),
mock
.
call
(
'description_desc'
),
mock
.
call
(
'
\n
Target
s:'
),
mock
.
call
(
'
\n
Device
s:'
),
mock
.
call
(
'target_desc'
),
mock
.
call
(
'
\n
Authors:'
),
mock
.
call
(
'authors_desc'
),
...
...
This diff is collapsed.
Click to expand it.
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment