Releases: threat9/routersploit
Releases · threat9/routersploit
I Knew You Were Trouble 3.4.0
- Fixing
setup.py
resources - Switching to pycroptodome
- Fixing communication API
- Adding
exploits/routers/asus/asuswrt_lan_rce.py
module - Fixing
exploits/routers/asus/infosvr_backdoor_rce.py
module - Adding credentials used by Mirai botnet
- Fixing 3com Officeconnect RCE module
- Fixing
exploits/routers/billion/billion_5200w_rce.py
module - Fixing
exploits/routers/cisco/catalyst_2960_rocem.py
module - Fixing
exploits/routers/cisco/firepower_management60_rce.py
module - Fixing
exploits/routers/dlink/dir_815_850l_rce.py
module - Fixing
exploits/routers/multi/tcp_32764_rce.py
module - Fixing
exploits/routers/ubiquiti/airos_6_x.py
module - Adding
OptEncoder
option - Fixing
use
command issue - Adding tests
tests/exploits/cameras/cisco/test_video_surv_path_traversal.py
- Adding tests for modules default values
- Adding tests
tests/exploits/routers/asus/test_infosvr_backdoor_rce.py
- Adding tests
tests/exploits/routers/billion/test_billion_5200w_rce.py
- Adding tests
tests/exploits/routers/cisco/test_firepower_management60_rce.py
- Adding tests
tests/exploits/routers/cisco/test_secure_acs_bypass.py
- Adding tests
tests/exploits/routers/dlink/test_dcs_930l_auth_rce.py
- Adding tests
tests/exploits/routers/technicolor/test_tg784_authbypass.py
- Adding tests
tests/exploits/routers/dlink/test_dsl_2730b_2780b_526b_dns_change.py
- Fixing
exploits/routers/ipfire/ipfire_proxy_rce.py
module - Fixing
exploits/routers/ipfire/ipfire_shellshock.py
module - Adding
exploits/routers/linksys/eseries_themoon_rce.py
module
I Knew You Were Trouble 3.3.0
- Improving tcp communication
- Adding
encoders/python/hex
module - Adding
encoders/perl/hex
module - Adding
exploits/routers/mikrotik/winbox_auth_bypass_creds_disclosure
module
I Knew You Were Trouble 3.2.0
- Adding
payloads/cmd/python_bind_udp
module - Adding
payloads/python/bind_udp
module - Adding
payloads/python/reverse_udp
module - Adding
payloads/cmd/python_reverse_udp
module - Adding
payloads/python/reverse_udp
module - Adding
payloads/cmd/php_bind_tcp
module - Adding
payloads/php/bind_tcp
module - Adding
payloads/cmd/awk_bind_udp
module - Adding
tests
for payloads - Adding
docs
for payloads - Fixing OptBool option
- Fixing Telnet communication
- Adding
setup.py
- Adding
tests
for udp based exploits - Fixing
exploits/routers/zte/zxv10_rce
module - Fixing
exploits/generic/heartbleed
module - Adding
encoders/perl/base64
module - Adding
encoders/php/base64
module - Adding
encoders/php/hex
module - Adding
encoders/python/base64
module - Fixing
.github/ISSUE_TEMPLATE.md
I Knew You Were Trouble 3.1.0
- Adding
.github/ISSUE_TEMPLATE.md
template - Adding
.github/PULL_REQUEST_TEMPLATE.md
template - Adding documentation to
exploits/routers/dlink/dsl_2750b_rce
module - Adding documentation to
creds
modules - Adding
generic/upnp/ssdp_msearch
module - Fixing
exploits/routers/multi/tcp_32764_info_disclosure
module - Fixing
exploits/routers/multi/tcp_32764_rce
module - Fixing readme ubuntu installation instruction
- Fixing UDP & TCP based modules
- Adding
payloads/x86/bind_tcp
payload - Adding
payloads/x86/reverse_tcp
payload - Adding
payloads/x64/bind_tcp
payload - Adding
payloads/x64/reverse_tcp
payload
I Knew You Were Trouble 3.0.0
- Expand targets by adding exploits for IoT class devices e.g. cameras, printers, smart kitchen appliances.
payloads
modulesshell()
function for establishing reverse-shell connection.- Now you can easily lookup exploits using
search
command. e.g.search dlink
- Supporting
requests
sessions inhttp_request()
Option()
validation usingvalidators
module
e.g.foo = Option(1, "foo", validators=validators.integer)
- tests has been moved out of
routersploit
directory - Refactor of
Dockerfile
- Add new set of default credentials
- Add vendor scanners
- Countless of fixes in numerous exploit modules.
- Numerous new exploits.
Bad Blood 2.2.1
New features
- Threaded support for scanners which makes them waaay faster! (see scanners/autopwn implementation for details).
Bad Blood 2.2.0
New features
- Validators for exploit's options to transform its values #89
- Adding global options (setg command) #97
- Creating new modules from template #88
- Additional sub-commands to show command #87
- "help" command #30
- Tokenizer #11
- Ctrl+C new prompt, Ctrl+D rsf kill #90
Bug fixes
- Disable check in scanner module #85
- SSHException: Channel closed #81
- Error 104 : Connection reset by peer #75
- Multiple minor fixes
New modules
- routersploit/modules/exploits/dlink/dir_300_645_815_upnp_rce.py
- routersploit/modules/exploits/dlink/multi_hnap_rce.py
- routersploit/modules/exploits/dlink/dcs_930l_auth_rce.py
- routersploit/modules/exploits/dlink/dir_645_815_rce.py
- routersploit/modules/exploits/thomson/twg850_password_disclosure.py
- routersploit/modules/exploits/zte/f609_config_disclosure.py
- routersploit/modules/exploits/thomson/twg849_info_disclosure.py
- routersploit/modules/exploits/tplink/wdr740nd_wdr740n_backdoor.py
- routersploit/modules/exploits/multi/ssh_auth_keys.py
- routersploit/modules/exploits/tplink/wdr740nd_wdr740n_path_traversal.py
- routersploit/modules/exploits/zte/f460_f660_backdoor.py
- routersploit/modules/exploits/ipfire/ipfire_proxy_rce.py
- routersploit/modules/exploits/ipfire/ipfire_shellshock.py
- routersploit/modules/exploits/3com/3cradsl72_info_disclosure.py
- routersploit/modules/exploits/3com/ap8760_password_disclosure.py
- routersploit/modules/exploits/3com/imc_info_disclosure.py
- routersploit/modules/exploits/3com/imc_path_traversal.py
- routersploit/modules/exploits/3com/officeconnect_info_disclosure.py
- routersploit/modules/exploits/3com/officeconnect_rce.py
- routersploit/modules/exploits/dlink/dir_300_320_600_615_info_disclosure.py
- routersploit/modules/exploits/2wire/4011g_5012nv_path_traversal.py
- routersploit/modules/exploits/dlink/dsl_2640b_dns_change.py
- routersploit/modules/exploits/dlink/dsl_2730b_2780b_526b_dns_change.py
- routersploit/modules/exploits/dlink/dsl_2740r_dns_change.py
- routersploit/modules/exploits/shuttle/915wm_dns_change.py
- routersploit/modules/exploits/cisco/dpc2420_info_disclosure.py
- routersploit/modules/exploits/cisco/ucm_info_disclosure.py
- routersploit/modules/exploits/cisco/unified_multi_path_traversal.py
- routersploit/modules/exploits/cisco/video_surv_path_traversal.py
- routersploit/modules/exploits/huawei/e5331_mifi_info_disclosure.py
- routersploit/modules/exploits/huawei/hg530_hg520b_password_disclosure.py
- routersploit/modules/exploits/huawei/hg630a_default_creds.py
- routersploit/modules/exploits/huawei/hg866_password_change.py
- routersploit/modules/exploits/huawei/hg520_info_dislosure.py
- routersploit/modules/exploits/netcore/udp_53413_rce.py
- routersploit/modules/exploits/quantum/dxi_privkey.py
- routersploit/modules/exploits/multi/tcp_32764_info_disclosure.py
- routersploit/modules/exploits/multi/tcp_32764_rce.py
- routersploit/modules/exploits/multi/heartbleed.py
Bad Blood 2.1.0
New features
- Feeding
Exploit
with text file containing multiple targets definition - Static analysis for modules #34 #56
http_request()
default timeout #74- Verbosity level to
utils.print_*()
functions #12 exit
command #19- Muting all the module's noise during execution of
check()
#17
Bug fixes
- Interpreter line wrapping #54
- Unexpected crash of
AutoPwnd
scanner #48 - False positives during vulnerability scan #20
- Multiple bug fixes for various exploits.
New modules
Bad Blood 2.0.0
Routersploit v.2.0.0 Bad Blood
Wildest Dreams 1.0.0
RouterSploit v1.0.0 Wildest Dreams