You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When I try to run a command in the target's CMD, a runtime error occurs in python.
rsf > use exploits/routers/zyxel/p660hn_t_v2_rce
rsf (Zyxel P660HN-T v2 RCE) > set target 192.168.15.1
[+] target => 192.168.15.1
rsf (Zyxel P660HN-T v2 RCE) > run
[] Running module exploits/routers/zyxel/p660hn_t_v2_rce...
[+] Target appears to be vulnerable
[] Invoking command loop...
[*] It is blind command injection - response is not available. Command length up to 28 characters.
[+] Welcome to cmd. Commands are sent to the target via the execute method.
[*] For further exploitation use 'show payloads' and 'set payload ' commands.
cmd > show version
[*] Executing 'show version' on the device...
Traceback (most recent call last):
File "/usr/lib/python3/dist-packages/routersploit/interpreter.py", line 389, in command_run
self.current_module.run()
File "/usr/lib/python3/dist-packages/routersploit/modules/exploits/routers/zyxel/p660hn_t_v2_rce.py", line 39, in run
shell(self, architecture="mipsbe")
File "/usr/lib/python3/dist-packages/routersploit/core/exploit/shell.py", line 152, in shell
print_info(exploit.execute(cmd))
File "/usr/lib/python3/dist-packages/routersploit/modules/exploits/routers/zyxel/p660hn_t_v2_rce.py", line 53, in execute
self.http_request(
File "/usr/lib/python3/dist-packages/routersploit/core/http/http_client.py", line 46, in http_request
return getattr(session, method.lower())(url, **kwargs)
AttributeError: 'NoneType' object has no attribute 'post'
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "/usr/bin/routersploit", line 29, in
routersploit(sys.argv)
File "/usr/bin/routersploit", line 25, in routersploit
rsf.start()
File "/usr/lib/python3/dist-packages/routersploit/interpreter.py", line 125, in start
command_handler(args, **kwargs)
File "/usr/lib/python3/dist-packages/routersploit/core/exploit/utils.py", line 177, in wrapper
return fn(self, *args, **kwargs)
File "/usr/lib/python3/dist-packages/routersploit/interpreter.py", line 394, in command_run
print_error(traceback.format_exc(sys.exc_info()))
File "/usr/lib/python3.9/traceback.py", line 167, in format_exc
return "".join(format_exception(*sys.exc_info(), limit=limit, chain=chain))
File "/usr/lib/python3.9/traceback.py", line 120, in format_exception
└─$
File "/usr/lib/python3.9/traceback.py", line 517, in init
Environment
RouterSploit Version used: 3.4.1
Operating System and version: Kali Linux 5.10.60.1-microsoft-standard-WSL2
When I try to run a command in the target's CMD, a runtime error occurs in python.
rsf > use exploits/routers/zyxel/p660hn_t_v2_rce
rsf (Zyxel P660HN-T v2 RCE) > set target 192.168.15.1
[+] target => 192.168.15.1
rsf (Zyxel P660HN-T v2 RCE) > run
[] Running module exploits/routers/zyxel/p660hn_t_v2_rce...
[+] Target appears to be vulnerable
[] Invoking command loop...
[*] It is blind command injection - response is not available. Command length up to 28 characters.
[+] Welcome to cmd. Commands are sent to the target via the execute method.
[*] For further exploitation use 'show payloads' and 'set payload ' commands.
cmd > show version
[*] Executing 'show version' on the device...
Traceback (most recent call last):
File "/usr/lib/python3/dist-packages/routersploit/interpreter.py", line 389, in command_run
self.current_module.run()
File "/usr/lib/python3/dist-packages/routersploit/modules/exploits/routers/zyxel/p660hn_t_v2_rce.py", line 39, in run
shell(self, architecture="mipsbe")
File "/usr/lib/python3/dist-packages/routersploit/core/exploit/shell.py", line 152, in shell
print_info(exploit.execute(cmd))
File "/usr/lib/python3/dist-packages/routersploit/modules/exploits/routers/zyxel/p660hn_t_v2_rce.py", line 53, in execute
self.http_request(
File "/usr/lib/python3/dist-packages/routersploit/core/http/http_client.py", line 46, in http_request
return getattr(session, method.lower())(url, **kwargs)
AttributeError: 'NoneType' object has no attribute 'post'
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "/usr/bin/routersploit", line 29, in
routersploit(sys.argv)
File "/usr/bin/routersploit", line 25, in routersploit
rsf.start()
File "/usr/lib/python3/dist-packages/routersploit/interpreter.py", line 125, in start
command_handler(args, **kwargs)
File "/usr/lib/python3/dist-packages/routersploit/core/exploit/utils.py", line 177, in wrapper
return fn(self, *args, **kwargs)
File "/usr/lib/python3/dist-packages/routersploit/interpreter.py", line 394, in command_run
print_error(traceback.format_exc(sys.exc_info()))
File "/usr/lib/python3.9/traceback.py", line 167, in format_exc
return "".join(format_exception(*sys.exc_info(), limit=limit, chain=chain))
File "/usr/lib/python3.9/traceback.py", line 120, in format_exception
└─$
File "/usr/lib/python3.9/traceback.py", line 517, in init
Environment
bcrypt==3.2.0
bluepy==1.3.0
certifi==2021.10.8
cffi==1.15.0
chardet==3.0.4
cryptography==36.0.2
future==0.18.2
http-request==1.2
idna==2.8
invoke==1.4.1
paramiko==2.10.2
ply==3.11
pyasn1==0.4.8
pycparser==2.21
pycryptodome==3.14.1
pycryptodomex==3.14.1
PyNaCl==1.5.0
pysmi==0.3.4
pysnmp==4.4.6
PyYAML==5.4.1
requests==2.21.0
routersploit==3.4.0
shell==1.0.1
six==1.16.0
start==0.2
urllib3==1.24.3
The text was updated successfully, but these errors were encountered: