[+] Target is vulnerable
[*] Downloading rom-0 file...
[*] Extracting password from file...
Traceback (most recent call last):
File "/root/routersploit/routersploit/interpreter.py", line 334, in command_run
self.current_module.run()
File "/root/routersploit/routersploit/modules/exploits/routers/multi/rom0.py", line 60, in run
password = self.extract_password(response.content)
File "/root/routersploit/routersploit/modules/exploits/routers/multi/rom0.py", line 70, in extract_password
result, window = LZSDecompress(data[fpos:])
File "/root/routersploit/routersploit/libs/lzs/lzs.py", line 100, in LZSDecompress
bit = reader.getBit()
File "/root/routersploit/routersploit/libs/lzs/lzs.py", line 41, in getBit
return self._bits.popleft()
IndexError: pop from an empty deque
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "rsf.py", line 26, in
routersploit()
File "rsf.py", line 22, in routersploit
rsf.start()
File "/root/routersploit/routersploit/interpreter.py", line 116, in start
command_handler(args)
File "/root/routersploit/routersploit/core/exploit/utils.py", line 175, in wrapper
return fn(self, *args, *kwargs)
File "/root/routersploit/routersploit/interpreter.py", line 339, in command_run
print_error(traceback.format_exc(sys.exc_info()))
File "/usr/lib/python3.6/traceback.py", line 167, in format_exc
return "".join(format_exception(sys.exc_info(), limit=limit, chain=chain))
File "/usr/lib/python3.6/traceback.py", line 121, in format_exception
type(value), value, tb, limit=limit).format(chain=chain))
File "/usr/lib/python3.6/traceback.py", line 509, in init
capture_locals=capture_locals)
File "/usr/lib/python3.6/traceback.py", line 338, in extract
if limit >= 0:
TypeError: '>=' not supported between instances of 'tuple' and 'int'
* If describing a bug, tell us what happens instead of the expected behavior
* If suggesting a change/improvement, tell us how it works right now
## Expected Behavior
* If you're describing a bug, tell us what should happen
* If you're suggesting a change/improvement, tell us how it should work
! ANY INCOMPLETE REPORT WILL BE CLOSED RIGHT AWAY !
Steps to Reproduce (for bugs)
Your Environment
python3 -m pip freeze
) AdvancedHTTPServer==2.0.11 ajpy==0.0.4 alembic==1.0.0.dev0 asn1crypto==0.24.0 Babel==2.6.0 basemap==1.1.0 bcrypt==3.1.4 beautifulsoup4==4.6.3 binwalk==2.1.2 blinker==1.4 boltons==18.0.0 Brlapi==0.6.7 Brotli==1.0.7 certifi==2018.8.24 chardet==3.0.4 chrome-gnome-shell==0.0.0 click==7.0.dev0 colorama==0.3.7 crcelk==1.2 cryptography==2.3 cupshelpers==1.0 cycler==0.10.0 debtags==2.1 decorator==4.3.0 distro==1.3.0 dnspython==1.15.0 ecdsa==0.13 email-validator==1.0.3 entrypoints==0.2.3.post3 Flask==1.0.2 Flask-Babel==0.12.2 future==0.17.1 geoip2==2.9.0 geojson==2.4.1 graphene==2.0.1 graphene-sqlalchemy==2.0.0 graphql-core==2.1 graphql-relay==0.4.5 h11==0.8.1 h2==3.0.1 hashID==3.1.4 hpack==3.0.0 html5lib==1.0.1 httplib2==0.11.3 hyperframe==5.1.0 icalendar==4.0.3 idna==2.6 IPy==0.83 iso8601==0.1.11 itsdangerous==1.1.0 Jinja2==2.10 jsonschema==2.6.0 kaitaistruct==0.8 keyring==15.1.0 keyrings.alt==3.1 kiwisolver==1.0.1 ldap3==2.4.1 louis==3.7.0 lxml==4.2.5 Mako==1.0.7 MarkupSafe==1.0 matplotlib==2.2.2 maxminddb==1.4.1 mitmproxy==4.0.4 msgpack==0.5.6 mysqlclient==1.3.10 numpy==1.14.5 olefile==0.46 paramiko==2.4.0 passlib==1.7.1 patator==0.7 Pillow==5.3.0 pluginbase==0.7 ply==3.11 promise==2.0.1 psycopg2==2.7.5 pyasn1==0.4.2 pycairo==1.16.2 pycrypto==2.6.1 pycryptodome==3.7.0 pycryptodomex==3.6.1 pycups==1.9.73 pycurl==7.43.0.1 pyenchant==2.0.0 Pygments==2.2.0 PyGObject==3.30.1 pygtkspellcheck==4.0.5 PyNaCl==1.2.1 PyOpenGL==3.1.0 pyOpenSSL==18.0.0 pyotp==2.2.6 pyparsing==2.2.0 pyperclip==1.6.4 pyproj==1.9.5.1 pyqtgraph==0.10.0 pyserial==3.4 pyshp==1.2.12 pysmbc==1.0.15.6 pysmi==0.3.2 pysnmp==4.4.6 PySocks==1.6.8 python-apt==1.7.0 python-dateutil==2.6.1 python-debian==0.1.33 python-debianbts==2.7.2 python-editor==1.0.3 python-pam==1.8.4 pytz==2018.5 pyxdg==0.25 PyYAML==3.12 reportbug==7.5.0 requests==2.20.0 requests-file==1.4.3 ruamel.yaml==0.15.34 Rx==1.6.1 scipy==1.1.0 SecretStorage==2.3.1 six==1.11.0 smoke-zephyr==1.3.3 sortedcontainers==2.0.4 SQLAlchemy==1.2.8 tabulate==0.8.2 termcolor==1.1.0 termineter==1.0.4 tld==0.9.1 tornado==5.1.1 tzlocal==1.5.1 unattended-upgrades==0.1 urllib3==1.24 urwid==2.0.1 virtualenv==15.1.0 wafw00f==0.9.5 wapiti3==3.0.1 webencodings==0.5 websocket-client==0.53.0 Werkzeug==0.14.1 wsproto==0.11.0 XlsxWriter==0.9.6 yaswfp==0.9.3Current Behavior
During handling of the above exception, another exception occurred:
Traceback (most recent call last): File "rsf.py", line 26, in
routersploit()
File "rsf.py", line 22, in routersploit
rsf.start()
File "/root/routersploit/routersploit/interpreter.py", line 116, in start
command_handler(args)
File "/root/routersploit/routersploit/core/exploit/utils.py", line 175, in wrapper
return fn(self, *args, *kwargs)
File "/root/routersploit/routersploit/interpreter.py", line 339, in command_run
print_error(traceback.format_exc(sys.exc_info()))
File "/usr/lib/python3.6/traceback.py", line 167, in format_exc
return "".join(format_exception(sys.exc_info(), limit=limit, chain=chain))
File "/usr/lib/python3.6/traceback.py", line 121, in format_exception
type(value), value, tb, limit=limit).format(chain=chain))
File "/usr/lib/python3.6/traceback.py", line 509, in init
capture_locals=capture_locals)
File "/usr/lib/python3.6/traceback.py", line 338, in extract
if limit >= 0:
TypeError: '>=' not supported between instances of 'tuple' and 'int'