This module exploits password reset feature on some TP-Link Archer routers by leveraging a predictable random number generator seed. For more details, see this write-up: https://devcraft.io/posts/2017/07/21/tp-link-archer-c9-admin-password-reset.html Based on PoC by William Bowling.
| Name |
Last commit
|
Last update |
|---|---|---|
| .github | Loading commit data... | |
| .travis | Loading commit data... | |
| docs/modules | Loading commit data... | |
| routersploit | Loading commit data... | |
| tests | Loading commit data... | |
| .dockerignore | Loading commit data... | |
| .gitignore | Loading commit data... | |
| .travis.yml | Loading commit data... | |
| CONTRIBUTING.md | Loading commit data... | |
| Dockerfile | Loading commit data... | |
| LICENSE | Loading commit data... | |
| MANIFEST.in | Loading commit data... | |
| Makefile | Loading commit data... | |
| README.md | Loading commit data... | |
| requirements-dev.txt | Loading commit data... | |
| requirements.txt | Loading commit data... | |
| rsf.py | Loading commit data... | |
| setup.py | Loading commit data... |