Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Exception in thread thread-5: & hangs in the end. No vulnerability summary shows. #743

Open
WeenDwijler opened this issue Jun 12, 2021 · 0 comments

Comments

@WeenDwijler
Copy link

! ANY INCOMPLETE REPORT WILL BE CLOSED RIGHT AWAY !

Steps to Reproduce (for bugs)

1.sudo python3 rsf.py
2.use scanners/routers/router_scan
3.set target 192.168.1.1 (router)
4.run

Your Environment

  • RouterSploit Version used: 3.4.1
  • Operating System and version: Kali Linux 2021.1 fully updated & upgraded
  • Python Version: ( python3 --version ) 3.9.2
  • Python Environment: ( python3 -m pip freeze )

Current Behavior

runs well until this:
[-] 192.168.1.1:80 http exploits/routers/movistar/adsl_router_bhs_rta_path_traversal is not vulnerable
Exception in thread thread-5:
Traceback (most recent call last):
File "/usr/lib/python3.9/threading.py", line 954, in _bootstrap_inner
self.run()
File "/usr/lib/python3.9/threading.py", line 892, in run
self._target(*self._args, **self._kwargs)
File "/home/kali/tools/routersploit/routersploit/modules/scanners/autopwn.py", line 172, in exploits_target_function
response = exploit.check()
File "/home/kali/tools/routersploit/routersploit/core/exploit/exploit.py", line 187, in wrapper
return fn(self, *args, **kwargs)
File "/home/kali/tools/routersploit/routersploit/modules/exploits/routers/mikrotik/routeros_jailbreak.py", line 57, in check
res = re.findall(b"version: (.+?) ", output)
File "/usr/lib/python3.9/re.py", line 241, in findall
return _compile(pattern, flags).findall(string)
TypeError: expected string or bytes-like object
continues to run well
[-] 192.168.1.1:22 ssh exploits/generic/ssh_auth_keys is not vulnerable

it hangs at the end, never comes with the summary. Have to Ctrl C it to get back to command prompt of routersploit.

Expected Behavior

Run without interruptions and finish properly with vulnerability summary.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant