threat9 / routersploit

Exploitation Framework for Embedded Devices
Other
12.1k stars 2.31k forks source link

Error while using the tool #723

Open mnpavankumar opened 3 years ago

mnpavankumar commented 3 years ago

Traceback (most recent call last): File "/usr/bin/routersploit", line 26, in routersploit() File "/usr/bin/routersploit", line 22, in routersploit rsf.start() File "/usr/lib/python3/dist-packages/routersploit/interpreter.py", line 116, in start command_handler(args) File "/usr/lib/python3/dist-packages/routersploit/interpreter.py", line 319, in command_use self.current_module = import_exploit(module_path)() File "/usr/lib/python3/dist-packages/routersploit/core/exploit/utils.py", line 107, in import_exploit module = importlib.import_module(path) File "/usr/lib/python3.8/importlib/init.py", line 127, in import_module return _bootstrap._gcd_import(name[level:], package, level) File "", line 1014, in _gcd_import File "", line 991, in _find_and_load File "", line 975, in _find_and_load_unlocked File "", line 671, in _load_unlocked File "", line 783, in exec_module File "", line 219, in _call_with_frames_removed File "/usr/lib/python3/dist-packages/routersploit/modules/scanners/routers/router_scan.py", line 1, in from routersploit.modules.scanners.autopwn import Exploit File "/usr/lib/python3/dist-packages/routersploit/modules/scanners/autopwn.py", line 6, in class Exploit(Exploit): File "/usr/lib/python3/dist-packages/routersploit/core/exploit/exploit.py", line 45, in new for key, value in iteritems(attrs): RuntimeError: dictionary keys changed during iteration

mnpavankumar commented 3 years ago

*] Running module exploits/routers/multi/misfortune_cookie... Traceback (most recent call last): File "/root/routersploit/routersploit/interpreter.py", line 389, in command_run self.current_module.run() File "/root/routersploit/routersploit/modules/exploits/routers/multi/misfortune_cookie.py", line 123, in run if self.device == "" or re.match(r"^\d+?$", self.device) is None or int(self.device) < 0 or int(self.device) >= len(devices): File "/usr/lib/python3.8/re.py", line 191, in match return _compile(pattern, flags).match(string) TypeError: expected string or bytes-like object

During handling of the above exception, another exception occurred:

Traceback (most recent call last): File "rsf.py", line 29, in routersploit(sys.argv) File "rsf.py", line 25, in routersploit rsf.start() File "/root/routersploit/routersploit/interpreter.py", line 125, in start command_handler(args, *kwargs) File "/root/routersploit/routersploit/core/exploit/utils.py", line 177, in wrapper return fn(self, args, *kwargs) File "/root/routersploit/routersploit/interpreter.py", line 394, in command_run print_error(traceback.format_exc(sys.exc_info())) File "/usr/lib/python3.8/traceback.py", line 167, in format_exc return "".join(format_exception(sys.exc_info(), limit=limit, chain=chain)) File "/usr/lib/python3.8/traceback.py", line 120, in format_exception return list(TracebackException( File "/usr/lib/python3.8/traceback.py", line 509, in init self.stack = StackSummary.extract( File "/usr/lib/python3.8/traceback.py", line 340, in extract if limit >= 0: TypeError: '>=' not supported between instances of 'tuple' and 'int'