Marcin Bury

Results 35 comments of Marcin Bury

Run: ``` python3 -m venv venv source venv/bin/activate pip install -r requirements.txt ./rsf.py ```

You are missing required modules, in this case `paramiko` ``` python3 -m venv venv source venv/bin/activate pip install -r requirements.txt ./rsf.py ```

Check: https://github.com/threat9/routersploit/wiki/Exploits

it should be `set payload mipsle/reverse_tcp`

You need to use one of the payloads, in this case reverse_tcp to get interactive shell.

I've contacted the maintainer of pypi's routersploit package and requested a transfer. There was never version "6.0" of routersploit.

This issue has been resolved by making a copy of `attrs`

Its likely not vulnerable. This exploit is causing a lot of false positives, need to figure out the way to make a check more reliable.

@0BuRner We gonna implement this feature