threat9 / routersploit

Exploitation Framework for Embedded Devices
Other
12.1k stars 2.31k forks source link

Could not set up HTTP Server on #796

Closed mohammadabk2 closed 4 months ago

mohammadabk2 commented 1 year ago

! ANY INCOMPLETE REPORT WILL BE CLOSED RIGHT AWAY !

Steps to Reproduce (for bugs)

  1. use scanners/autopwn
  2. set target 3.run 4.use exploits/routers/linksys/eseries_themoon_rce 5.check Target is vulnerable 6.run 7.show payloads [*] Available payloads:

    Payload Name Description


    mipsle/bind_tcp MIPSLE Bind TCP Creates interactive tcp bind shell for MIPSLE architecture. mipsle/reverse_tcp MIPSLE Reverse TCP Creates interactive tcp reverse shell for MIPSLE architecture.

  3. set payload mipsle/reverse_tcp [] Executing 'set mipsle/reverse_tcp' on the device... 9.set lhost 10.set lport 11.run first time shows ( [] Using wget method [] Using wget to download binary [-] Exploit failed to transfer payload) after that it shows( [] Using wget method [-] Could not set up HTTP Server on 10.0.0.2:5555 [-] Exploit failed to transfer payload)

Your Environment

Current Behavior

Expected Behavior

*

whAkira commented 1 year ago

Same problem, anyone knows how to fix

lucyoa commented 4 months ago

Its likely not vulnerable. This exploit is causing a lot of false positives, need to figure out the way to make a check more reliable.