You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Operating System and version: Kali Linux 2021.1 fully updated & upgraded
Python Version: ( python3 --version ) 3.9.2
Python Environment: ( python3 -m pip freeze )
Current Behavior
runs well until this:
[-] 192.168.1.1:80 http exploits/routers/movistar/adsl_router_bhs_rta_path_traversal is not vulnerable
Exception in thread thread-5:
Traceback (most recent call last):
File "/usr/lib/python3.9/threading.py", line 954, in _bootstrap_inner
self.run()
File "/usr/lib/python3.9/threading.py", line 892, in run
self._target(*self._args, **self._kwargs)
File "/home/kali/tools/routersploit/routersploit/modules/scanners/autopwn.py", line 172, in exploits_target_function
response = exploit.check()
File "/home/kali/tools/routersploit/routersploit/core/exploit/exploit.py", line 187, in wrapper
return fn(self, *args, **kwargs)
File "/home/kali/tools/routersploit/routersploit/modules/exploits/routers/mikrotik/routeros_jailbreak.py", line 57, in check
res = re.findall(b"version: (.+?) ", output)
File "/usr/lib/python3.9/re.py", line 241, in findall
return _compile(pattern, flags).findall(string)
TypeError: expected string or bytes-like object
continues to run well
[-] 192.168.1.1:22 ssh exploits/generic/ssh_auth_keys is not vulnerable
it hangs at the end, never comes with the summary. Have to Ctrl C it to get back to command prompt of routersploit.
Expected Behavior
Run without interruptions and finish properly with vulnerability summary.
The text was updated successfully, but these errors were encountered:
! ANY INCOMPLETE REPORT WILL BE CLOSED RIGHT AWAY !
Steps to Reproduce (for bugs)
1.sudo python3 rsf.py
2.use scanners/routers/router_scan
3.set target 192.168.1.1 (router)
4.run
Your Environment
python3 --version
) 3.9.2python3 -m pip freeze
)Current Behavior
runs well until this:
[-] 192.168.1.1:80 http exploits/routers/movistar/adsl_router_bhs_rta_path_traversal is not vulnerable
Exception in thread thread-5:
Traceback (most recent call last):
File "/usr/lib/python3.9/threading.py", line 954, in _bootstrap_inner
self.run()
File "/usr/lib/python3.9/threading.py", line 892, in run
self._target(*self._args, **self._kwargs)
File "/home/kali/tools/routersploit/routersploit/modules/scanners/autopwn.py", line 172, in exploits_target_function
response = exploit.check()
File "/home/kali/tools/routersploit/routersploit/core/exploit/exploit.py", line 187, in wrapper
return fn(self, *args, **kwargs)
File "/home/kali/tools/routersploit/routersploit/modules/exploits/routers/mikrotik/routeros_jailbreak.py", line 57, in check
res = re.findall(b"version: (.+?) ", output)
File "/usr/lib/python3.9/re.py", line 241, in findall
return _compile(pattern, flags).findall(string)
TypeError: expected string or bytes-like object
continues to run well
[-] 192.168.1.1:22 ssh exploits/generic/ssh_auth_keys is not vulnerable
it hangs at the end, never comes with the summary. Have to Ctrl C it to get back to command prompt of routersploit.
Expected Behavior
Run without interruptions and finish properly with vulnerability summary.
The text was updated successfully, but these errors were encountered: