routersploit
routersploit copied to clipboard
possibly netgear r7000_r6400_rce exploit shows vuln when not
Steps to Reproduce (for bugs)
- latest fully firmware patched netgear R7000 nighthawk ac1900 router
- latest routersploit with updated pyasn1 on fully updated raspberry pi
- run routersploit against home network router IP address
- attempt exploit by browsing to http://[router-address]/cgi-bin/;uname$IFS-a
- a login screen pops up in browser which is what I believe is making the exploit code think it is vulnerable
Your Environment
- RouterSploit Version used:
3.3.0
- Operating System and version:
Linux pi-hole 4.14.52-v7+ #1123 SMP Wed Jun 27 17:35:49 BST 2018 armv7l GNU/Linux
- Python Version:
3.5.3
- Python Environment:
automationhat==0.1.0
bcrypt==3.1.4
blinker==1.3
blinkt==0.1.2
buttonshim==0.0.2
Cap1xxx==0.1.3
cffi==1.11.5
chardet==2.3.0
click==6.6
colorama==0.3.7
cryptography==1.7.1
drumhat==0.1.0
envirophat==1.0.0
ExplorerHAT==0.4.2
Flask==0.12.1
fourletterphat==0.1.0
future==0.16.0
gpiozero==1.4.1
idna==2.2
itsdangerous==0.24
jedi==0.10.2
Jinja2==2.8
keyring==10.1
keyrings.alt==1.3
MarkupSafe==0.23
mcpi==0.1.1
microdotphat==0.2.1
mote==0.0.3
motephat==0.0.2
numpy==1.12.1
oauthlib==2.0.1
pantilthat==0.0.6
paramiko==2.4.2
pgzero==1.2
phatbeat==0.1.1
pianohat==0.1.0
picamera==1.13
picraft==1.0
piglow==1.2.4
pigpio==1.38
Pillow==4.0.0
ply==3.11
pyasn1==0.4.4
pycparser==2.19
pycrypto==2.6.1
pycryptodome==3.6.6
pycryptodomex==3.6.6
pygame==1.9.3
pygobject==3.22.0
pyinotify==0.9.6
PyJWT==1.4.2
PyNaCl==1.3.0
pyOpenSSL==16.2.0
pyserial==3.2.1
pysmi==0.3.1
pysnmp==4.4.6
python-apt==1.1.0b5
pyxdg==0.25
rainbowhat==0.1.0
requests==2.12.4
requests-oauthlib==0.7.0
RPi.GPIO==0.6.3
RTIMULib==7.2.1
scrollphat==0.0.7
scrollphathd==1.2.1
SecretStorage==2.3.1
sense-emu==1.1
sense-hat==2.2.0
simplejson==3.10.0
six==1.10.0
skywriter==0.0.7
sn3218==1.2.7
spidev==3.3
thonny==2.1.16
touchphat==0.0.1
twython==3.4.0
unicornhathd==0.0.3
urllib3==1.19.1
Werkzeug==0.11.15
Current Behavior
- routersploit detects vulnerability when there is none
- suggest looking at the code in the exploit checker to see if it is doing it properly when router prompts for login creds
Expected Behavior
- it should correctly say if the router is vulnerable
ref: https://kb.netgear.com/000036386/CVE-2016-582384