Marcin Bury
Marcin Bury
Run: ``` python3 -m venv venv source venv/bin/activate pip install -r requirements.txt ./rsf.py ```
You are missing required modules, in this case `paramiko` ``` python3 -m venv venv source venv/bin/activate pip install -r requirements.txt ./rsf.py ```
Check: https://github.com/threat9/routersploit/wiki/Exploits
it should be `set payload mipsle/reverse_tcp`
You need to use one of the payloads, in this case reverse_tcp to get interactive shell.
I've contacted the maintainer of pypi's routersploit package and requested a transfer. There was never version "6.0" of routersploit.
Resolved
This issue has been resolved by making a copy of `attrs`
Its likely not vulnerable. This exploit is causing a lot of false positives, need to figure out the way to make a check more reliable.
@0BuRner We gonna implement this feature