threat9 / routersploit

Exploitation Framework for Embedded Devices
Other
12.2k stars 2.32k forks source link

Error 104 : Connection reset by peer #75

Closed felangga closed 8 years ago

felangga commented 8 years ago

I'm about to scan my tplink router with scanner/autopwn, but it give me this error rsf (AutoPwn) > run [_] Running module... [-] exploits/comtrend/ct_5361t_password_disclosure is not vulnerable [-] exploits/asmax/ar_1004g_password_disclosure is not vulnerable [-] exploits/asmax/ar_804_gu_rce is not vulnerable [-] exploits/2wire/gateway_auth_bypass is not vulnerable [-] exploits/belkin/g_n150_password_disclosure is not vulnerable [-] exploits/belkin/n150_path_traversal is not vulnerable [-] exploits/belkin/n750_rce is not vulnerable [-] exploits/belkin/g_plus_info_disclosure is not vulnerable [-] exploits/juniper/screenos_backdoor is not vulnerable [-] exploits/ubiquiti/airos_6_x is not vulnerable [-] exploits/multi/misfortune_cookie is not vulnerable [-] exploits/multi/shellshock is not vulnerable [-] Traceback (most recent call last): File "/home/netgear/pwn/routersploit/routersploit/interpreter.py", line 261, in command_run self.current_module.run() File "/home/netgear/pwn/routersploit/routersploit/modules/scanners/autopwn.py", line 51, in run response = exploit.check() File "/home/netgear/pwn/routersploit/routersploit/utils.py", line 153, in wrapper return fn(self, args, _kwargs) File "routersploit/modules/exploits/multi/heartbleed.py", line 164, in check typ, ver, pay = self.recvmsg(s) File "routersploit/modules/exploits/multi/heartbleed.py", line 102, in recvmsg pay = self.recvall(s, ln, 10) File "routersploit/modules/exploits/multi/heartbleed.py", line 87, in recvall data = s.recv(remain) error: [Errno 104] Connection reset by peer

lucyoa commented 8 years ago

@felangga I pushed fix with this commit: b203413148bba02c7ddf3c9805692f4f0ae196b6 Please check if it works properly.

felangga commented 8 years ago

Yeah, that's working perfectly