Closed xuzheliang135 closed 3 years ago
You should not remove the set -euo pipefail
line, by removing it you allow the script to continue with errors, which is what you see: there are many many errors showing.
The script works, many people use it without issues (I myself used it with two Xiaomi 4A Gigabit
). I think there is something wrong on your procedure.
Using Linux to execute the code. the generated tar.gz file was different on Windows and Linux, and I believe there is something wrong with the tar.gz file generated on windows
That is something that has been mentioned in other issues. Glad you managed to make it work
I tryies the version 0.0.6 on my Xiaomi 4A Gigabit, and it doesn't work. I had solve other problems that mentioned in issues, such as "change to router mode" , "use stok in the same machine","use mirror for github". But they are all useless. Finally, I tried the version 0.0.1 and get reverse shell. After I get the shell, I try to find why the version 0.0.6 doesn't work. I find the payload "script.sh" was already uploaded in /tmp which means the vulnerability was not fixed in FW2.28.38. But when I runs command "sh /tmp/script.sh exploit" manually, I get error messages as below(I deleted the first line "set -euo pipefail" which raises a exception either):
Is there something wrong in what I did or the script just doesn't work on FW 2.28.38 ? (I also tried the FW 2.28.62 you provided in README, but I haven't test weather it doesn't work for the same reason)
How I get reverse shell using version 0.0.1: