-
This is the test module.
```python
from routersploit import (
exploits,
mute,
)
class Exploit(exploits.Exploit):
__info__ = {
'name': 'Test print_table.',
'de…
-
FROM #242
SIEMENS IP-Camera CVMS2025-IR / CCMS2025 - Credentials Disclosure
https://www.exploit-db.com/exploits/40254/
I've finished.
I found a vulns ip from zoomeye to verify the module:
…
-
Hi,I have used the interesting tool and found some spelling mistakes recently.
They can cause some errors.
RouterSploit version:3.0.0
```
rsf > use creds/routers/tplink/ssh_default_creds
[-…
-
@0BuRner added tc7200_password_disclosure_v2 in #154 and claimed that it was not tested. I guess nobody ran the exploit sucessfully since the initial commit. It has several issues:
The module searche…
-
Thanks for creating this promising tool, guys!
One little question: How to list all available modules/exps? Similar to MSF
> show exploits
Thanks!
-
On OpenBSD/amd64 -current I'm running routersploit v2.2.1 `scanners/autopwn`which results in the following backtrace:
```
rsf > use scanners/autopwn
rsf (AutoPwn) > help
Global commands:
he…
-
Credentials leak: It leaks a file 'get_params.cgi' which contains all the credentials stored/configured on the device.
https://github.com/somu1795/netwave_ip_camera_vulnerability
ghost updated
6 years ago
-
Implement Cisco Catalyst 2960 IOS 12.2(55)SE11 - 'ROCEM' RCE exploit
References:
* https://www.exploit-db.com/exploits/41872/
* https://artkond.com/2017/04/10/cisco-catalyst-remote-code-execution…
-
Not an issue per se, just an addendum to the documentation.
Seems to work well on Mac (at least the autopwn part). I only had to install these Python modules:
```
sudo pip install requests paramiko …
-
Codename : I Knew You Were Trouble
Version : 3.0.0
root@kali:~# uname -a
Linux kali 4.15.0-kali2-amd64 #1 SMP Debian 4.15.11-1kali1 (2018-03-21) x86_64 GNU/Linux
root@kali:~# python3 --…
micax updated
6 years ago