threat9 / routersploit

Exploitation Framework for Embedded Devices
Other
12.03k stars 2.31k forks source link

(fatal) segmentation fault while running scanner modules #621

Closed McDonaldsTriad closed 4 years ago

McDonaldsTriad commented 4 years ago

Steps to Reproduce (for bugs)

  1. python3 rsf.py

  2. rsf > use scanners/autopwn

  3. rsf (AutoPwn) > set target 192.168.178.1 [+] target => 192.168.178.1

  4. rsf (AutoPwn) > run [] Running module scanners/autopwn... [] 192.168.178.1 Starting vulnerablity check... Segmentatiefout (=Segmentation error translated to English)

  5. python3 rsf.py

  6. rsf > use scanners/routers/router_scan

  7. rsf (Router Scanner) > set target 192.168.178.1 [+] target => 192.168.178.1

  8. rsf (Router Scanner) > run [] Running module scanners/routers/router_scan... [] 192.168.178.1 Starting vulnerablity check... Segmentatiefout

  9. python3 rsf.py

  10. rsf > use scanners/routers/router_scan

  11. rsf (Misc Scanner) > set target 192.168.178.1 [+] target => 192.168.178.1

  12. rsf (Misc Scanner) > run [] Running module scanners/misc/misc_scan... [] 192.168.178.1 Starting vulnerablity check... [-] 192.168.178.1:80 http exploits/generic/heartbleed is not vulnerable [-] 192.168.178.1:80 http exploits/misc/miele/pg8528_path_traversal is not vulnerable [-] 192.168.178.1:80 http exploits/misc/wepresent/wipg1000_rce is not vulnerable [-] 192.168.178.1:80 http exploits/misc/asus/b1m_projector_rce is not vulnerable [-] 192.168.178.1:22 ssh exploits/generic/ssh_auth_keys is not vulnerable [-] 192.168.178.1:80 http exploits/generic/shellshock is not vulnerable [*] Elapsed time: 60.0700 seconds

    [*] 192.168.178.1 Starting default credentials check... Segmentatiefout

  13. rsf > use scanners/cameras/camera_scan

  14. rsf (Camera Scanner) > show options

  15. rsf (Camera Scanner) > set target 192.168.178.1 [+] target => 192.168.178.1

  16. rsf (Camera Scanner) > run [*] Running module scanners/cameras/camera_scan...

[] 192.168.178.1 Starting vulnerablity check... [-] 192.168.178.1:80 http exploits/generic/heartbleed is not vulnerable [-] 192.168.178.1:80 http exploits/cameras/mvpower/dvr_jaws_rce is not vulnerable [-] 192.168.178.1:80 http exploits/cameras/honeywell/hicc_1100pt_password_disclosure is not vulnerable [-] 192.168.178.1:80 http exploits/cameras/avigilon/videoiq_camera_path_traversal is not vulnerable [-] 192.168.178.1:80 http exploits/cameras/xiongmai/uc_httpd_path_traversal is not vulnerable [-] 192.168.178.1:80 http exploits/cameras/jovision/jovision_credentials_disclosure is not vulnerable [-] 192.168.178.1:22 ssh exploits/generic/ssh_auth_keys is not vulnerable [-] 192.168.178.1:80 http exploits/cameras/siemens/cvms2025_credentials_disclosure is not vulnerable [-] 192.168.178.1:80 http exploits/cameras/brickcom/corp_network_cameras_conf_disclosure is not vulnerable [-] 192.168.178.1:80 http exploits/generic/shellshock is not vulnerable [-] 192.168.178.1:80 http exploits/cameras/cisco/video_surv_path_traversal is not vulnerable [-] 192.168.178.1:80 http exploits/cameras/dlink/dcs_930l_932l_auth_bypass is not vulnerable [-] 192.168.178.1:80 http exploits/cameras/brickcom/users_cgi_creds_disclosure is not vulnerable [-] 192.168.178.1:23 telnet exploits/cameras/grandstream/gxv3611hd_ip_camera_sqli is not vulnerable [-] 192.168.178.1:80 http exploits/cameras/multi/dvr_creds_disclosure is not vulnerable [-] 192.168.178.1:80 http exploits/cameras/multi/jvc_vanderbilt_honeywell_path_traversal is not vulnerable [-] 192.168.178.1:23 telnet exploits/cameras/grandstream/gxv3611hd_ip_camera_backdoor is not vulnerable [-] 192.168.178.1:80 http exploits/cameras/multi/P2P_wificam_rce is not vulnerable [-] 192.168.178.1:80 http exploits/cameras/multi/P2P_wificam_credential_disclosure is not vulnerable [-] 192.168.178.1:80 http exploits/cameras/multi/netwave_ip_camera_information_disclosure is not vulnerable [] Elapsed time: 120.1400 seconds

[*] 192.168.178.1 Starting default credentials check... Segmentatiefout

Current Behavior

Starting up RouterSploit also goes without any issues, and so does choosing a module and setting it up. But when I try to run the module, and that module happens to be one of the scanner modules, almost inmediately RouterSploit gives me an error and quits on me. I've tested several different modules to see what happens, but only while using 1 of the 4 scanner modules I encounter the problem mentioned. When I run any of the exploit modules I don't seem to get any errors, although I've only tested a couple exploit modules.

Expected Behavior

McDonaldsTriad commented 4 years ago

The problem has been solved. Several days ago I ran the usual apt-update command, followed by apt-upgrade, and that sorted everything out. Since the update & upgrade routersploit functions like normal again, no more segmentation faults!