Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

not supported between instances of 'tuple' and 'int' ( after apt-get upgrade ) #725

Open
RamezReZ opened this issue Jan 18, 2021 · 2 comments

Comments

@RamezReZ
Copy link

┌──(root💀r)-[/home/r/routersploit]
└─# python3 rsf.py


| ___ \ | | / | | | () |
| |
/ /
__ _ | | ___ _ \ --. _ __ | | ___ _| |_ | // _ \| | | | __/ _ \ '__|--. \ ' | |/ _ | | |
| |\ \ () | || | || / | /_/ / |) | | () | | |
_| __/ _,|___
|| _
/| ./|_|__/||_|
| |
Exploitation Framework for |_| by Threat9
Embedded Devices

Codename : I Knew You Were Trouble
Version : 3.4.1
Homepage : https://www.threat9.com - @threatnine
Join Slack : https://www.threat9.com/slack

Join Threat9 Beta Program - https://www.threat9.com

Exploits: 132 Scanners: 4 Creds: 171 Generic: 4 Payloads: 32 Encoders: 6

rsf > use scanners/autopwn
rsf (AutoPwn) > run
[*] Running module scanners/autopwn...

[] Starting vulnerablity check...
[-] :80 http exploits/generic/shellshock is not vulnerable
[-] :80 http exploits/generic/heartbleed is not vulnerable
[-] :80 http exploits/routers/netsys/multi_rce is not vulnerable
[-] :80 http exploits/routers/comtrend/ct_5361t_password_disclosure is not vulnerable
[-] :80 http exploits/routers/belkin/n150_path_traversal is not vulnerable
[-] :80 http exploits/routers/belkin/g_n150_password_disclosure is not vulnerable
[-] :80 http exploits/routers/belkin/play_max_prce is not vulnerable
[-] :80 http exploits/routers/belkin/g_plus_info_disclosure is not vulnerable
[-] :80 http exploits/routers/belkin/auth_bypass is not vulnerable
[-] :80 http exploits/routers/belkin/n750_rce is not vulnerable
[
] :80 http exploits/routers/billion/billion_5200w_rce Could not be verified
[-] :80 http exploits/routers/billion/billion_7700nr4_password_disclosure is not vulnerable
[-] :8291 custom/tcp exploits/routers/mikrotik/winbox_auth_bypass_creds_disclosure is not vulnerable
[-] :22 ssh exploits/routers/mikrotik/routeros_jailbreak is not vulnerable
[-] :80 http exploits/routers/bhu/bhu_urouter_rce is not vulnerable
[-] :80 http exploits/routers/2wire/4011g_5012nv_path_traversal is not vulnerable
[-] :80 http exploits/routers/2wire/gateway_auth_bypass is not vulnerable
[-] :80 http exploits/routers/cisco/unified_multi_path_traversal is not vulnerable
[] :80 http exploits/routers/cisco/secure_acs_bypass Could not be verified
[-] :80 http exploits/routers/cisco/firepower_management60_rce is not vulnerable
[-] :80 http exploits/routers/cisco/dpc2420_info_disclosure is not vulnerable
[-] :22 ssh exploits/routers/fortinet/fortigate_os_backdoor is not vulnerable
[-] :69 custom/udp exploits/routers/cisco/ucm_info_disclosure is not vulnerable
[
] :23 custom/tcp exploits/routers/cisco/catalyst_2960_rocem Could not be verified
[-] :80 http exploits/routers/cisco/ios_http_authorization_bypass is not vulnerable
[-] :80 http exploits/routers/cisco/ucs_manager_rce is not vulnerable
[-] :80 http exploits/routers/movistar/adsl_router_bhs_rta_path_traversal is not vulnerable
[-] :53413 custom/udp exploits/routers/netcore/udp_53413_rce is not vulnerable
[-] :80 http exploits/routers/ubiquiti/airos_6_x is not vulnerable
[-] :80 http exploits/routers/huawei/hg530_hg520b_password_disclosure is not vulnerable
[-] :43690 custom/udp exploits/routers/huawei/hg520_info_disclosure is not vulnerable
[-] :80 http exploits/routers/huawei/hg866_password_change is not vulnerable
[-] :80 http exploits/routers/cisco/firepower_management60_path_traversal is not vulnerable
[-] :80 http exploits/routers/thomson/twg850_password_disclosure is not vulnerable
[-] :80 http exploits/routers/huawei/e5331_mifi_info_disclosure is not vulnerable
[-] :80 http exploits/routers/tplink/archer_c2_c20i_rce is not vulnerable
[-] :80 http exploits/routers/tplink/wdr842nd_wdr842n_configure_disclosure is not vulnerable
[-] :80 http exploits/routers/tplink/wdr740nd_wdr740n_backdoor is not vulnerable
[-] :80 http exploits/routers/tplink/wdr740nd_wdr740n_path_traversal is not vulnerable
[-] :80 http exploits/routers/3com/imc_path_traversal is not vulnerable
[-] :80 http exploits/routers/3com/officeconnect_info_disclosure is not vulnerable
[-] :80 http exploits/routers/3com/ap8760_password_disclosure is not vulnerable
[] :80 http exploits/routers/3com/officeconnect_rce Could not be verified
[-] :80 http exploits/routers/netgear/multi_rce is not vulnerable
[
] :80 http exploits/routers/netgear/dgn2200_dnslookup_cgi_rce Could not be verified
[-] :80 http exploits/routers/netgear/dgn2200_ping_cgi_rce is not vulnerable
[-] :80 http exploits/routers/netgear/multi_password_disclosure-2017-5521 is not vulnerable
[-] :80 http exploits/routers/netgear/wnr500_612v3_jnr1010_2010_path_traversal is not vulnerable
[-] :80 http exploits/routers/netgear/prosafe_rce is not vulnerable
[-] :80 http exploits/routers/netgear/jnr1010_path_traversal is not vulnerable
[-] :80 http exploits/routers/netgear/r7000_r6400_rce is not vulnerable
[-] :80 http exploits/routers/netgear/n300_auth_bypass is not vulnerable
[-] :80 http exploits/routers/linksys/1500_2500_rce is not vulnerable
[-] :80 http exploits/routers/linksys/wap54gv3_rce is not vulnerable
[-] :80 http exploits/routers/linksys/smartwifi_password_disclosure is not vulnerable
[-] :80 http exploits/routers/linksys/eseries_themoon_rce is not vulnerable
[-] :80 http exploits/routers/ipfire/ipfire_shellshock is not vulnerable
[-] :80 http exploits/routers/ipfire/ipfire_oinkcode_rce is not vulnerable
[-] :80 http exploits/routers/ipfire/ipfire_proxy_rce is not vulnerable
[-] :80 http exploits/routers/asmax/ar_1004g_password_disclosure is not vulnerable
[-] :80 http exploits/routers/asmax/ar_804_gu_rce is not vulnerable
[-] :80 http exploits/routers/zyxel/zywall_usg_extract_hashes is not vulnerable
[-] :80 http exploits/routers/zyxel/p660hn_t_v2_rce is not vulnerable
[-] :80 http exploits/routers/zyxel/d1000_rce is not vulnerable
[-] :80 http exploits/routers/zyxel/p660hn_t_v1_rce is not vulnerable
[-] :80 http exploits/routers/zyxel/d1000_wifi_password_disclosure is not vulnerable
[-] :80 http exploits/routers/technicolor/dwg855_authbypass is not vulnerable
[-] :21 ftp exploits/routers/technicolor/tg784_authbypass is not vulnerable
[-] :80 http exploits/routers/technicolor/tc7200_password_disclosure_v2 is not vulnerable
[-] :80 http exploits/routers/technicolor/tc7200_password_disclosure is not vulnerable
[] :80 http exploits/routers/dlink/dsl_2640b_dns_change Could not be verified
[-] :80 http exploits/routers/dlink/dir_300_320_615_auth_bypass is not vulnerable
[-] :80 http exploits/routers/dlink/dsl_2750b_info_disclosure is not vulnerable
[
] :80 http exploits/routers/dlink/dsl_2730b_2780b_526b_dns_change Could not be verified
[-] :80 http exploits/routers/dlink/dwr_932_info_disclosure is not vulnerable
[-] :80 http exploits/routers/dlink/dgs_1510_add_user is not vulnerable
[-] :80 http exploits/routers/linksys/wrt100_110_rce is not vulnerable
[-] :80 http exploits/routers/dlink/dir_850l_creds_disclosure is not vulnerable
[-] :80 http exploits/routers/dlink/multi_hnap_rce is not vulnerable
[-] :80 http exploits/routers/dlink/multi_hedwig_cgi_exec is not vulnerable
[] :1900 custom/udp exploits/routers/dlink/dir_815_850l_rce Could not be verified
[-] :39889 custom/udp exploits/routers/dlink/dwr_932b_backdoor is not vulnerable
[-] :80 http exploits/routers/dlink/dir_645_password_disclosure is not vulnerable
[-] :80 http exploits/routers/dlink/dir_825_path_traversal is not vulnerable
[-] :80 http exploits/routers/dlink/dns_320l_327l_rce is not vulnerable
[-] :80 http exploits/routers/dlink/dir_300_320_600_615_info_disclosure is not vulnerable
[-] :80 http exploits/routers/dlink/dsl_2730_2750_path_traversal is not vulnerable
[-] :80 http exploits/routers/dlink/dsp_w110_rce is not vulnerable
[
] :80 http exploits/routers/dlink/dsl_2740r_dns_change Could not be verified
[-] :80 http exploits/routers/dlink/dir_300_600_rce is not vulnerable
[-] :80 http exploits/routers/dlink/dcs_930l_auth_rce is not vulnerable
[-] :80 http exploits/routers/dlink/dir_8xx_password_disclosure is not vulnerable
[-] :80 http exploits/routers/dlink/dwl_3200ap_password_disclosure is not vulnerable
[-] :80 http exploits/routers/dlink/dvg_n5402sp_path_traversal is not vulnerable
[-] :1900 custom/udp exploits/routers/dlink/dir_300_645_815_upnp_rce is not vulnerable
[-] :80 http exploits/routers/dlink/dir_645_815_rce is not vulnerable
[] :80 http exploits/routers/shuttle/915wm_dns_change Could not be verified
[-] :80 http exploits/routers/zte/f460_f660_backdoor is not vulnerable
[-] :80 http exploits/routers/3com/imc_info_disclosure is not vulnerable
[-] :80 http exploits/routers/dlink/dsl_2750b_rce is not vulnerable
[
] :80 http exploits/routers/asus/asuswrt_lan_rce Could not be verified
[-] :80 http exploits/routers/asus/rt_n16_password_disclosure is not vulnerable
[-] :9999 custom/udp exploits/routers/asus/infosvr_backdoor_rce is not vulnerable
[-] :80 http exploits/routers/zte/zxv10_rce is not vulnerable
[-] :32764 custom/tcp exploits/routers/multi/tcp_32764_info_disclosure is not vulnerable
[-] :32764 custom/tcp exploits/routers/multi/tcp_32764_rce is not vulnerable
[-] :80 http exploits/routers/multi/rom0 is not vulnerable
[-] :80 http exploits/routers/multi/misfortune_cookie is not vulnerable
[-] :80 http exploits/cameras/brickcom/corp_network_cameras_conf_disclosure is not vulnerable
[-] :80 http exploits/cameras/brickcom/users_cgi_creds_disclosure is not vulnerable
[-] :80 http exploits/cameras/xiongmai/uc_httpd_path_traversal is not vulnerable
[-] :80 http exploits/cameras/cisco/video_surv_path_traversal is not vulnerable
[-] :80 http exploits/cameras/jovision/jovision_credentials_disclosure is not vulnerable
[-] :80 http exploits/cameras/mvpower/dvr_jaws_rce is not vulnerable
[-] :23 telnet exploits/cameras/grandstream/gxv3611hd_ip_camera_sqli is not vulnerable
[-] :23 telnet exploits/cameras/grandstream/gxv3611hd_ip_camera_backdoor is not vulnerable
[-] :80 http exploits/cameras/siemens/cvms2025_credentials_disclosure is not vulnerable
[-] :80 http exploits/cameras/dlink/dcs_930l_932l_auth_bypass is not vulnerable
[-] :80 http exploits/cameras/multi/netwave_ip_camera_information_disclosure is not vulnerable
[-] :80 http exploits/cameras/multi/dvr_creds_disclosure is not vulnerable
[-] :80 http exploits/cameras/multi/jvc_vanderbilt_honeywell_path_traversal is not vulnerable
[-] :80 http exploits/cameras/multi/P2P_wificam_rce is not vulnerable
[-] :80 http exploits/cameras/multi/P2P_wificam_credential_disclosure is not vulnerable
[-] :80 http exploits/routers/zte/zxhn_h108n_wifi_password_disclosure is not vulnerable
[-] :80 http exploits/cameras/avigilon/videoiq_camera_path_traversal is not vulnerable
[-] :80 http exploits/cameras/honeywell/hicc_1100pt_password_disclosure is not vulnerable
[-] :80 http exploits/misc/miele/pg8528_path_traversal is not vulnerable
[-] :80 http exploits/misc/asus/b1m_projector_rce is not vulnerable
[-] :80 http exploits/misc/wepresent/wipg1000_rce is not vulnerable
Traceback (most recent call last):
File "/home/r/routersploit/routersploit/interpreter.py", line 389, in command_run
self.current_module.run()
File "/home/r/routersploit/routersploit/modules/scanners/autopwn.py", line 81, in run
self.run_threads(self.threads, self.exploits_target_function, data)
File "/home/r/routersploit/routersploit/core/exploit/exploit.py", line 114, in run_threads
while thread.isAlive():
AttributeError: 'Thread' object has no attribute 'isAlive'

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
File "/home/r/routersploit/rsf.py", line 29, in
routersploit(sys.argv)
File "/home/r/routersploit/rsf.py", line 25, in routersploit
rsf.start()
File "/home/r/routersploit/routersploit/interpreter.py", line 125, in start
command_handler(args, **kwargs)
File "/home/r/routersploit/routersploit/core/exploit/utils.py", line 177, in wrapper
return fn(self, *args, **kwargs)
File "/home/r/routersploit/routersploit/interpreter.py", line 394, in command_run
print_error(traceback.format_exc(sys.exc_info()))
File "/usr/lib/python3.9/traceback.py", line 167, in format_exc
return "".join(format_exception(*sys.exc_info(), limit=limit, chain=chain))
File "/usr/lib/python3.9/traceback.py", line 120, in format_exception
return list(TracebackException(
File "/usr/lib/python3.9/traceback.py", line 508, in init
self.stack = StackSummary.extract(
File "/usr/lib/python3.9/traceback.py", line 340, in extract
if limit >= 0:
TypeError: '>=' not supported between instances of 'tuple' and 'int'
[-] :22 ssh exploits/generic/ssh_auth_keys is not vulnerable
[-] :22 snmp exploits/routers/thomson/twg849_info_disclosure is not vulnerable

@d4rks0ul555
Copy link

192.168.1.1 Starting vulnerablity check...
Traceback (most recent call last):
File "/root/routersploit/routersploit/core/exploit/utils.py", line 109, in import_exploit
module = importlib.import_module(path)
File "/usr/lib/python3.9/importlib/init.py", line 127, in import_module
return _bootstrap._gcd_import(name[level:], package, level)
File "", line 1030, in _gcd_import
File "", line 1007, in _find_and_load
File "", line 986, in _find_and_load_unlocked
File "", line 680, in _load_unlocked
File "", line 790, in exec_module
File "", line 228, in _call_with_frames_removed
File "/root/routersploit/routersploit/modules/exploits/generic/shellshock.py", line 4, in
from routersploit.core.http.http_client import HTTPClient
File "/root/routersploit/routersploit/core/http/http_client.py", line 2, in
import requests
File "/usr/local/lib/python3.9/dist-packages/requests/init.py", line 112, in
from . import utils
File "/usr/local/lib/python3.9/dist-packages/requests/utils.py", line 24, in
from . import certs
File "/usr/local/lib/python3.9/dist-packages/requests/certs.py", line 15, in
from certifi import where
ImportError: cannot import name 'where' from 'certifi' (/usr/local/lib/python3.9/dist-packages/certifi/init.py)

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
File "/root/routersploit/routersploit/interpreter.py", line 389, in command_run
self.current_module.run()
File "/root/routersploit/routersploit/modules/scanners/autopwn.py", line 77, in run
for module in utils.iter_modules(directory):
File "/root/routersploit/routersploit/core/exploit/utils.py", line 138, in iter_modules
yield import_exploit(path)
File "/root/routersploit/routersploit/core/exploit/utils.py", line 120, in import_exploit
raise RoutersploitException(
routersploit.core.exploit.exceptions.RoutersploitException: Error during loading 'routersploit/modules/exploits/generic/shellshock'

Error: cannot import name 'where' from 'certifi' (/usr/local/lib/python3.9/dist-packages/certifi/init.py)

It should be valid path to the module. Use key multiple times for completion.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
File "/root/routersploit/rsf.py", line 29, in
routersploit(sys.argv)
File "/root/routersploit/rsf.py", line 25, in routersploit
rsf.start()
File "/root/routersploit/routersploit/interpreter.py", line 125, in start
command_handler(args, **kwargs)
File "/root/routersploit/routersploit/core/exploit/utils.py", line 177, in wrapper
return fn(self, *args, **kwargs)
File "/root/routersploit/routersploit/interpreter.py", line 394, in command_run
print_error(traceback.format_exc(sys.exc_info()))
File "/usr/lib/python3.9/traceback.py", line 167, in format_exc
return "".join(format_exception(*sys.exc_info(), limit=limit, chain=chain))
File "/usr/lib/python3.9/traceback.py", line 120, in format_exception
return list(TracebackException(
File "/usr/lib/python3.9/traceback.py", line 493, in init
context = TracebackException(
File "/usr/lib/python3.9/traceback.py", line 508, in init
self.stack = StackSummary.extract(
File "/usr/lib/python3.9/traceback.py", line 340, in extract
if limit >= 0:
TypeError: '>=' not supported between instances of 'tuple' and 'int'

please help

@MuratOzsoyler
Copy link

Error similar to @RamezReZ's one. First AttributeError: 'Thread' object has no attribute 'isAlive' and then TypeError: '>=' not supported between instances of 'tuple' and 'int'... Between [*] 192.168.48.1:80 http exploits/routers/dlink/dsl_2730b_2780b_526b_dns_change Could not be verified and [-] 192.168.48.1:80 http exploits/routers/dlink/dsp_w110_rce is not vulnerable.

Thanks in advance for your kind help.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants
@MuratOzsoyler @RamezReZ @d4rks0ul555 and others