I'm about to scan my tplink router with scanner/autopwn, but it give me this error
rsf (AutoPwn) > run
[_] Running module...
[-] exploits/comtrend/ct_5361t_password_disclosure is not vulnerable
[-] exploits/asmax/ar_1004g_password_disclosure is not vulnerable
[-] exploits/asmax/ar_804_gu_rce is not vulnerable
[-] exploits/2wire/gateway_auth_bypass is not vulnerable
[-] exploits/belkin/g_n150_password_disclosure is not vulnerable
[-] exploits/belkin/n150_path_traversal is not vulnerable
[-] exploits/belkin/n750_rce is not vulnerable
[-] exploits/belkin/g_plus_info_disclosure is not vulnerable
[-] exploits/juniper/screenos_backdoor is not vulnerable
[-] exploits/ubiquiti/airos_6_x is not vulnerable
[-] exploits/multi/misfortune_cookie is not vulnerable
[-] exploits/multi/shellshock is not vulnerable
[-] Traceback (most recent call last):
File "/home/netgear/pwn/routersploit/routersploit/interpreter.py", line 261, in command_run
self.current_module.run()
File "/home/netgear/pwn/routersploit/routersploit/modules/scanners/autopwn.py", line 51, in run
response = exploit.check()
File "/home/netgear/pwn/routersploit/routersploit/utils.py", line 153, in wrapper
return fn(self, args, _kwargs)
File "routersploit/modules/exploits/multi/heartbleed.py", line 164, in check
typ, ver, pay = self.recvmsg(s)
File "routersploit/modules/exploits/multi/heartbleed.py", line 102, in recvmsg
pay = self.recvall(s, ln, 10)
File "routersploit/modules/exploits/multi/heartbleed.py", line 87, in recvall
data = s.recv(remain)
error: [Errno 104] Connection reset by peer
I'm about to scan my tplink router with scanner/autopwn, but it give me this error rsf (AutoPwn) > run [_] Running module... [-] exploits/comtrend/ct_5361t_password_disclosure is not vulnerable [-] exploits/asmax/ar_1004g_password_disclosure is not vulnerable [-] exploits/asmax/ar_804_gu_rce is not vulnerable [-] exploits/2wire/gateway_auth_bypass is not vulnerable [-] exploits/belkin/g_n150_password_disclosure is not vulnerable [-] exploits/belkin/n150_path_traversal is not vulnerable [-] exploits/belkin/n750_rce is not vulnerable [-] exploits/belkin/g_plus_info_disclosure is not vulnerable [-] exploits/juniper/screenos_backdoor is not vulnerable [-] exploits/ubiquiti/airos_6_x is not vulnerable [-] exploits/multi/misfortune_cookie is not vulnerable [-] exploits/multi/shellshock is not vulnerable [-] Traceback (most recent call last): File "/home/netgear/pwn/routersploit/routersploit/interpreter.py", line 261, in command_run self.current_module.run() File "/home/netgear/pwn/routersploit/routersploit/modules/scanners/autopwn.py", line 51, in run response = exploit.check() File "/home/netgear/pwn/routersploit/routersploit/utils.py", line 153, in wrapper return fn(self, args, _kwargs) File "routersploit/modules/exploits/multi/heartbleed.py", line 164, in check typ, ver, pay = self.recvmsg(s) File "routersploit/modules/exploits/multi/heartbleed.py", line 102, in recvmsg pay = self.recvall(s, ln, 10) File "routersploit/modules/exploits/multi/heartbleed.py", line 87, in recvall data = s.recv(remain) error: [Errno 104] Connection reset by peer