Releases: threat9/routersploit
Releases · threat9/routersploit
I Knew You Were Trouble 3.4.0
- Fixing
setup.pyresources - Switching to pycroptodome
- Fixing communication API
- Adding
exploits/routers/asus/asuswrt_lan_rce.pymodule - Fixing
exploits/routers/asus/infosvr_backdoor_rce.pymodule - Adding credentials used by Mirai botnet
- Fixing 3com Officeconnect RCE module
- Fixing
exploits/routers/billion/billion_5200w_rce.pymodule - Fixing
exploits/routers/cisco/catalyst_2960_rocem.pymodule - Fixing
exploits/routers/cisco/firepower_management60_rce.pymodule - Fixing
exploits/routers/dlink/dir_815_850l_rce.pymodule - Fixing
exploits/routers/multi/tcp_32764_rce.pymodule - Fixing
exploits/routers/ubiquiti/airos_6_x.pymodule - Adding
OptEncoderoption - Fixing
usecommand issue - Adding tests
tests/exploits/cameras/cisco/test_video_surv_path_traversal.py - Adding tests for modules default values
- Adding tests
tests/exploits/routers/asus/test_infosvr_backdoor_rce.py - Adding tests
tests/exploits/routers/billion/test_billion_5200w_rce.py - Adding tests
tests/exploits/routers/cisco/test_firepower_management60_rce.py - Adding tests
tests/exploits/routers/cisco/test_secure_acs_bypass.py - Adding tests
tests/exploits/routers/dlink/test_dcs_930l_auth_rce.py - Adding tests
tests/exploits/routers/technicolor/test_tg784_authbypass.py - Adding tests
tests/exploits/routers/dlink/test_dsl_2730b_2780b_526b_dns_change.py - Fixing
exploits/routers/ipfire/ipfire_proxy_rce.pymodule - Fixing
exploits/routers/ipfire/ipfire_shellshock.pymodule - Adding
exploits/routers/linksys/eseries_themoon_rce.pymodule
I Knew You Were Trouble 3.3.0
- Improving tcp communication
- Adding
encoders/python/hexmodule - Adding
encoders/perl/hexmodule - Adding
exploits/routers/mikrotik/winbox_auth_bypass_creds_disclosuremodule
I Knew You Were Trouble 3.2.0
- Adding
payloads/cmd/python_bind_udpmodule - Adding
payloads/python/bind_udpmodule - Adding
payloads/python/reverse_udpmodule - Adding
payloads/cmd/python_reverse_udpmodule - Adding
payloads/python/reverse_udpmodule - Adding
payloads/cmd/php_bind_tcpmodule - Adding
payloads/php/bind_tcpmodule - Adding
payloads/cmd/awk_bind_udpmodule - Adding
testsfor payloads - Adding
docsfor payloads - Fixing OptBool option
- Fixing Telnet communication
- Adding
setup.py - Adding
testsfor udp based exploits - Fixing
exploits/routers/zte/zxv10_rcemodule - Fixing
exploits/generic/heartbleedmodule - Adding
encoders/perl/base64module - Adding
encoders/php/base64module - Adding
encoders/php/hexmodule - Adding
encoders/python/base64module - Fixing
.github/ISSUE_TEMPLATE.md
I Knew You Were Trouble 3.1.0
- Adding
.github/ISSUE_TEMPLATE.mdtemplate - Adding
.github/PULL_REQUEST_TEMPLATE.mdtemplate - Adding documentation to
exploits/routers/dlink/dsl_2750b_rcemodule - Adding documentation to
credsmodules - Adding
generic/upnp/ssdp_msearchmodule - Fixing
exploits/routers/multi/tcp_32764_info_disclosuremodule - Fixing
exploits/routers/multi/tcp_32764_rcemodule - Fixing readme ubuntu installation instruction
- Fixing UDP & TCP based modules
- Adding
payloads/x86/bind_tcppayload - Adding
payloads/x86/reverse_tcppayload - Adding
payloads/x64/bind_tcppayload - Adding
payloads/x64/reverse_tcppayload
I Knew You Were Trouble 3.0.0
- Expand targets by adding exploits for IoT class devices e.g. cameras, printers, smart kitchen appliances.
payloadsmodulesshell()function for establishing reverse-shell connection.- Now you can easily lookup exploits using
searchcommand. e.g.search dlink - Supporting
requestssessions inhttp_request() Option()validation usingvalidatorsmodule
e.g.foo = Option(1, "foo", validators=validators.integer)- tests has been moved out of
routersploitdirectory - Refactor of
Dockerfile - Add new set of default credentials
- Add vendor scanners
- Countless of fixes in numerous exploit modules.
- Numerous new exploits.
Bad Blood 2.2.1
New features
- Threaded support for scanners which makes them waaay faster! (see scanners/autopwn implementation for details).
Bad Blood 2.2.0
New features
- Validators for exploit's options to transform its values #89
- Adding global options (setg command) #97
- Creating new modules from template #88
- Additional sub-commands to show command #87
- "help" command #30
- Tokenizer #11
- Ctrl+C new prompt, Ctrl+D rsf kill #90
Bug fixes
- Disable check in scanner module #85
- SSHException: Channel closed #81
- Error 104 : Connection reset by peer #75
- Multiple minor fixes
New modules
- routersploit/modules/exploits/dlink/dir_300_645_815_upnp_rce.py
- routersploit/modules/exploits/dlink/multi_hnap_rce.py
- routersploit/modules/exploits/dlink/dcs_930l_auth_rce.py
- routersploit/modules/exploits/dlink/dir_645_815_rce.py
- routersploit/modules/exploits/thomson/twg850_password_disclosure.py
- routersploit/modules/exploits/zte/f609_config_disclosure.py
- routersploit/modules/exploits/thomson/twg849_info_disclosure.py
- routersploit/modules/exploits/tplink/wdr740nd_wdr740n_backdoor.py
- routersploit/modules/exploits/multi/ssh_auth_keys.py
- routersploit/modules/exploits/tplink/wdr740nd_wdr740n_path_traversal.py
- routersploit/modules/exploits/zte/f460_f660_backdoor.py
- routersploit/modules/exploits/ipfire/ipfire_proxy_rce.py
- routersploit/modules/exploits/ipfire/ipfire_shellshock.py
- routersploit/modules/exploits/3com/3cradsl72_info_disclosure.py
- routersploit/modules/exploits/3com/ap8760_password_disclosure.py
- routersploit/modules/exploits/3com/imc_info_disclosure.py
- routersploit/modules/exploits/3com/imc_path_traversal.py
- routersploit/modules/exploits/3com/officeconnect_info_disclosure.py
- routersploit/modules/exploits/3com/officeconnect_rce.py
- routersploit/modules/exploits/dlink/dir_300_320_600_615_info_disclosure.py
- routersploit/modules/exploits/2wire/4011g_5012nv_path_traversal.py
- routersploit/modules/exploits/dlink/dsl_2640b_dns_change.py
- routersploit/modules/exploits/dlink/dsl_2730b_2780b_526b_dns_change.py
- routersploit/modules/exploits/dlink/dsl_2740r_dns_change.py
- routersploit/modules/exploits/shuttle/915wm_dns_change.py
- routersploit/modules/exploits/cisco/dpc2420_info_disclosure.py
- routersploit/modules/exploits/cisco/ucm_info_disclosure.py
- routersploit/modules/exploits/cisco/unified_multi_path_traversal.py
- routersploit/modules/exploits/cisco/video_surv_path_traversal.py
- routersploit/modules/exploits/huawei/e5331_mifi_info_disclosure.py
- routersploit/modules/exploits/huawei/hg530_hg520b_password_disclosure.py
- routersploit/modules/exploits/huawei/hg630a_default_creds.py
- routersploit/modules/exploits/huawei/hg866_password_change.py
- routersploit/modules/exploits/huawei/hg520_info_dislosure.py
- routersploit/modules/exploits/netcore/udp_53413_rce.py
- routersploit/modules/exploits/quantum/dxi_privkey.py
- routersploit/modules/exploits/multi/tcp_32764_info_disclosure.py
- routersploit/modules/exploits/multi/tcp_32764_rce.py
- routersploit/modules/exploits/multi/heartbleed.py
Bad Blood 2.1.0
New features
- Feeding
Exploitwith text file containing multiple targets definition - Static analysis for modules #34 #56
http_request()default timeout #74- Verbosity level to
utils.print_*()functions #12 exitcommand #19- Muting all the module's noise during execution of
check()#17
Bug fixes
- Interpreter line wrapping #54
- Unexpected crash of
AutoPwndscanner #48 - False positives during vulnerability scan #20
- Multiple bug fixes for various exploits.
New modules
Bad Blood 2.0.0
Routersploit v.2.0.0 Bad Blood
Wildest Dreams 1.0.0
RouterSploit v1.0.0 Wildest Dreams