routersploit icon indicating copy to clipboard operation
routersploit copied to clipboard

not supported between instances of 'tuple' and 'int' ( after apt-get upgrade )

Open RamezReZ opened this issue 4 years ago • 2 comments

┌──(root💀r)-[/home/r/routersploit] └─# python3 rsf.py


| ___ \ | | / | | | () | | |/ /__ _ | | ___ _ \ --. _ __ | | ___ _| |_ | // _ \| | | | __/ _ \ '__|--. \ ' | |/ _ | | | | |\ \ () | || | || / | /_/ / |) | | () | | | _| __/ _,|___|| _/| ./|_|__/||_| | | Exploitation Framework for |_| by Threat9 Embedded Devices

Codename : I Knew You Were Trouble Version : 3.4.1 Homepage : https://www.threat9.com - @threatnine Join Slack : https://www.threat9.com/slack

Join Threat9 Beta Program - https://www.threat9.com

Exploits: 132 Scanners: 4 Creds: 171 Generic: 4 Payloads: 32 Encoders: 6

rsf > use scanners/autopwn rsf (AutoPwn) > run [*] Running module scanners/autopwn...

[] Starting vulnerablity check... [-] :80 http exploits/generic/shellshock is not vulnerable [-] :80 http exploits/generic/heartbleed is not vulnerable [-] :80 http exploits/routers/netsys/multi_rce is not vulnerable [-] :80 http exploits/routers/comtrend/ct_5361t_password_disclosure is not vulnerable [-] :80 http exploits/routers/belkin/n150_path_traversal is not vulnerable [-] :80 http exploits/routers/belkin/g_n150_password_disclosure is not vulnerable [-] :80 http exploits/routers/belkin/play_max_prce is not vulnerable [-] :80 http exploits/routers/belkin/g_plus_info_disclosure is not vulnerable [-] :80 http exploits/routers/belkin/auth_bypass is not vulnerable [-] :80 http exploits/routers/belkin/n750_rce is not vulnerable [] :80 http exploits/routers/billion/billion_5200w_rce Could not be verified [-] :80 http exploits/routers/billion/billion_7700nr4_password_disclosure is not vulnerable [-] :8291 custom/tcp exploits/routers/mikrotik/winbox_auth_bypass_creds_disclosure is not vulnerable [-] :22 ssh exploits/routers/mikrotik/routeros_jailbreak is not vulnerable [-] :80 http exploits/routers/bhu/bhu_urouter_rce is not vulnerable [-] :80 http exploits/routers/2wire/4011g_5012nv_path_traversal is not vulnerable [-] :80 http exploits/routers/2wire/gateway_auth_bypass is not vulnerable [-] :80 http exploits/routers/cisco/unified_multi_path_traversal is not vulnerable [] :80 http exploits/routers/cisco/secure_acs_bypass Could not be verified [-] :80 http exploits/routers/cisco/firepower_management60_rce is not vulnerable [-] :80 http exploits/routers/cisco/dpc2420_info_disclosure is not vulnerable [-] :22 ssh exploits/routers/fortinet/fortigate_os_backdoor is not vulnerable [-] :69 custom/udp exploits/routers/cisco/ucm_info_disclosure is not vulnerable [] :23 custom/tcp exploits/routers/cisco/catalyst_2960_rocem Could not be verified [-] :80 http exploits/routers/cisco/ios_http_authorization_bypass is not vulnerable [-] :80 http exploits/routers/cisco/ucs_manager_rce is not vulnerable [-] :80 http exploits/routers/movistar/adsl_router_bhs_rta_path_traversal is not vulnerable [-] :53413 custom/udp exploits/routers/netcore/udp_53413_rce is not vulnerable [-] :80 http exploits/routers/ubiquiti/airos_6_x is not vulnerable [-] :80 http exploits/routers/huawei/hg530_hg520b_password_disclosure is not vulnerable [-] :43690 custom/udp exploits/routers/huawei/hg520_info_disclosure is not vulnerable [-] :80 http exploits/routers/huawei/hg866_password_change is not vulnerable [-] :80 http exploits/routers/cisco/firepower_management60_path_traversal is not vulnerable [-] :80 http exploits/routers/thomson/twg850_password_disclosure is not vulnerable [-] :80 http exploits/routers/huawei/e5331_mifi_info_disclosure is not vulnerable [-] :80 http exploits/routers/tplink/archer_c2_c20i_rce is not vulnerable [-] :80 http exploits/routers/tplink/wdr842nd_wdr842n_configure_disclosure is not vulnerable [-] :80 http exploits/routers/tplink/wdr740nd_wdr740n_backdoor is not vulnerable [-] :80 http exploits/routers/tplink/wdr740nd_wdr740n_path_traversal is not vulnerable [-] :80 http exploits/routers/3com/imc_path_traversal is not vulnerable [-] :80 http exploits/routers/3com/officeconnect_info_disclosure is not vulnerable [-] :80 http exploits/routers/3com/ap8760_password_disclosure is not vulnerable [] :80 http exploits/routers/3com/officeconnect_rce Could not be verified [-] :80 http exploits/routers/netgear/multi_rce is not vulnerable [] :80 http exploits/routers/netgear/dgn2200_dnslookup_cgi_rce Could not be verified [-] :80 http exploits/routers/netgear/dgn2200_ping_cgi_rce is not vulnerable [-] :80 http exploits/routers/netgear/multi_password_disclosure-2017-5521 is not vulnerable [-] :80 http exploits/routers/netgear/wnr500_612v3_jnr1010_2010_path_traversal is not vulnerable [-] :80 http exploits/routers/netgear/prosafe_rce is not vulnerable [-] :80 http exploits/routers/netgear/jnr1010_path_traversal is not vulnerable [-] :80 http exploits/routers/netgear/r7000_r6400_rce is not vulnerable [-] :80 http exploits/routers/netgear/n300_auth_bypass is not vulnerable [-] :80 http exploits/routers/linksys/1500_2500_rce is not vulnerable [-] :80 http exploits/routers/linksys/wap54gv3_rce is not vulnerable [-] :80 http exploits/routers/linksys/smartwifi_password_disclosure is not vulnerable [-] :80 http exploits/routers/linksys/eseries_themoon_rce is not vulnerable [-] :80 http exploits/routers/ipfire/ipfire_shellshock is not vulnerable [-] :80 http exploits/routers/ipfire/ipfire_oinkcode_rce is not vulnerable [-] :80 http exploits/routers/ipfire/ipfire_proxy_rce is not vulnerable [-] :80 http exploits/routers/asmax/ar_1004g_password_disclosure is not vulnerable [-] :80 http exploits/routers/asmax/ar_804_gu_rce is not vulnerable [-] :80 http exploits/routers/zyxel/zywall_usg_extract_hashes is not vulnerable [-] :80 http exploits/routers/zyxel/p660hn_t_v2_rce is not vulnerable [-] :80 http exploits/routers/zyxel/d1000_rce is not vulnerable [-] :80 http exploits/routers/zyxel/p660hn_t_v1_rce is not vulnerable [-] :80 http exploits/routers/zyxel/d1000_wifi_password_disclosure is not vulnerable [-] :80 http exploits/routers/technicolor/dwg855_authbypass is not vulnerable [-] :21 ftp exploits/routers/technicolor/tg784_authbypass is not vulnerable [-] :80 http exploits/routers/technicolor/tc7200_password_disclosure_v2 is not vulnerable [-] :80 http exploits/routers/technicolor/tc7200_password_disclosure is not vulnerable [] :80 http exploits/routers/dlink/dsl_2640b_dns_change Could not be verified [-] :80 http exploits/routers/dlink/dir_300_320_615_auth_bypass is not vulnerable [-] :80 http exploits/routers/dlink/dsl_2750b_info_disclosure is not vulnerable [] :80 http exploits/routers/dlink/dsl_2730b_2780b_526b_dns_change Could not be verified [-] :80 http exploits/routers/dlink/dwr_932_info_disclosure is not vulnerable [-] :80 http exploits/routers/dlink/dgs_1510_add_user is not vulnerable [-] :80 http exploits/routers/linksys/wrt100_110_rce is not vulnerable [-] :80 http exploits/routers/dlink/dir_850l_creds_disclosure is not vulnerable [-] :80 http exploits/routers/dlink/multi_hnap_rce is not vulnerable [-] :80 http exploits/routers/dlink/multi_hedwig_cgi_exec is not vulnerable [] :1900 custom/udp exploits/routers/dlink/dir_815_850l_rce Could not be verified [-] :39889 custom/udp exploits/routers/dlink/dwr_932b_backdoor is not vulnerable [-] :80 http exploits/routers/dlink/dir_645_password_disclosure is not vulnerable [-] :80 http exploits/routers/dlink/dir_825_path_traversal is not vulnerable [-] :80 http exploits/routers/dlink/dns_320l_327l_rce is not vulnerable [-] :80 http exploits/routers/dlink/dir_300_320_600_615_info_disclosure is not vulnerable [-] :80 http exploits/routers/dlink/dsl_2730_2750_path_traversal is not vulnerable [-] :80 http exploits/routers/dlink/dsp_w110_rce is not vulnerable [] :80 http exploits/routers/dlink/dsl_2740r_dns_change Could not be verified [-] :80 http exploits/routers/dlink/dir_300_600_rce is not vulnerable [-] :80 http exploits/routers/dlink/dcs_930l_auth_rce is not vulnerable [-] :80 http exploits/routers/dlink/dir_8xx_password_disclosure is not vulnerable [-] :80 http exploits/routers/dlink/dwl_3200ap_password_disclosure is not vulnerable [-] :80 http exploits/routers/dlink/dvg_n5402sp_path_traversal is not vulnerable [-] :1900 custom/udp exploits/routers/dlink/dir_300_645_815_upnp_rce is not vulnerable [-] :80 http exploits/routers/dlink/dir_645_815_rce is not vulnerable [] :80 http exploits/routers/shuttle/915wm_dns_change Could not be verified [-] :80 http exploits/routers/zte/f460_f660_backdoor is not vulnerable [-] :80 http exploits/routers/3com/imc_info_disclosure is not vulnerable [-] :80 http exploits/routers/dlink/dsl_2750b_rce is not vulnerable [] :80 http exploits/routers/asus/asuswrt_lan_rce Could not be verified [-] :80 http exploits/routers/asus/rt_n16_password_disclosure is not vulnerable [-] :9999 custom/udp exploits/routers/asus/infosvr_backdoor_rce is not vulnerable [-] :80 http exploits/routers/zte/zxv10_rce is not vulnerable [-] :32764 custom/tcp exploits/routers/multi/tcp_32764_info_disclosure is not vulnerable [-] :32764 custom/tcp exploits/routers/multi/tcp_32764_rce is not vulnerable [-] :80 http exploits/routers/multi/rom0 is not vulnerable [-] :80 http exploits/routers/multi/misfortune_cookie is not vulnerable [-] :80 http exploits/cameras/brickcom/corp_network_cameras_conf_disclosure is not vulnerable [-] :80 http exploits/cameras/brickcom/users_cgi_creds_disclosure is not vulnerable [-] :80 http exploits/cameras/xiongmai/uc_httpd_path_traversal is not vulnerable [-] :80 http exploits/cameras/cisco/video_surv_path_traversal is not vulnerable [-] :80 http exploits/cameras/jovision/jovision_credentials_disclosure is not vulnerable [-] :80 http exploits/cameras/mvpower/dvr_jaws_rce is not vulnerable [-] :23 telnet exploits/cameras/grandstream/gxv3611hd_ip_camera_sqli is not vulnerable [-] :23 telnet exploits/cameras/grandstream/gxv3611hd_ip_camera_backdoor is not vulnerable [-] :80 http exploits/cameras/siemens/cvms2025_credentials_disclosure is not vulnerable [-] :80 http exploits/cameras/dlink/dcs_930l_932l_auth_bypass is not vulnerable [-] :80 http exploits/cameras/multi/netwave_ip_camera_information_disclosure is not vulnerable [-] :80 http exploits/cameras/multi/dvr_creds_disclosure is not vulnerable [-] :80 http exploits/cameras/multi/jvc_vanderbilt_honeywell_path_traversal is not vulnerable [-] :80 http exploits/cameras/multi/P2P_wificam_rce is not vulnerable [-] :80 http exploits/cameras/multi/P2P_wificam_credential_disclosure is not vulnerable [-] :80 http exploits/routers/zte/zxhn_h108n_wifi_password_disclosure is not vulnerable [-] :80 http exploits/cameras/avigilon/videoiq_camera_path_traversal is not vulnerable [-] :80 http exploits/cameras/honeywell/hicc_1100pt_password_disclosure is not vulnerable [-] :80 http exploits/misc/miele/pg8528_path_traversal is not vulnerable [-] :80 http exploits/misc/asus/b1m_projector_rce is not vulnerable [-] :80 http exploits/misc/wepresent/wipg1000_rce is not vulnerable Traceback (most recent call last): File "/home/r/routersploit/routersploit/interpreter.py", line 389, in command_run self.current_module.run() File "/home/r/routersploit/routersploit/modules/scanners/autopwn.py", line 81, in run self.run_threads(self.threads, self.exploits_target_function, data) File "/home/r/routersploit/routersploit/core/exploit/exploit.py", line 114, in run_threads while thread.isAlive(): AttributeError: 'Thread' object has no attribute 'isAlive'

During handling of the above exception, another exception occurred:

Traceback (most recent call last): File "/home/r/routersploit/rsf.py", line 29, in routersploit(sys.argv) File "/home/r/routersploit/rsf.py", line 25, in routersploit rsf.start() File "/home/r/routersploit/routersploit/interpreter.py", line 125, in start command_handler(args, **kwargs) File "/home/r/routersploit/routersploit/core/exploit/utils.py", line 177, in wrapper return fn(self, *args, **kwargs) File "/home/r/routersploit/routersploit/interpreter.py", line 394, in command_run print_error(traceback.format_exc(sys.exc_info())) File "/usr/lib/python3.9/traceback.py", line 167, in format_exc return "".join(format_exception(*sys.exc_info(), limit=limit, chain=chain)) File "/usr/lib/python3.9/traceback.py", line 120, in format_exception return list(TracebackException( File "/usr/lib/python3.9/traceback.py", line 508, in init self.stack = StackSummary.extract( File "/usr/lib/python3.9/traceback.py", line 340, in extract if limit >= 0: TypeError: '>=' not supported between instances of 'tuple' and 'int' [-] :22 ssh exploits/generic/ssh_auth_keys is not vulnerable [-] :22 snmp exploits/routers/thomson/twg849_info_disclosure is not vulnerable

RamezReZ avatar Jan 18 '21 07:01 RamezReZ

192.168.1.1 Starting vulnerablity check... Traceback (most recent call last): File "/root/routersploit/routersploit/core/exploit/utils.py", line 109, in import_exploit module = importlib.import_module(path) File "/usr/lib/python3.9/importlib/init.py", line 127, in import_module return _bootstrap._gcd_import(name[level:], package, level) File "", line 1030, in _gcd_import File "", line 1007, in _find_and_load File "", line 986, in _find_and_load_unlocked File "", line 680, in _load_unlocked File "", line 790, in exec_module File "", line 228, in _call_with_frames_removed File "/root/routersploit/routersploit/modules/exploits/generic/shellshock.py", line 4, in from routersploit.core.http.http_client import HTTPClient File "/root/routersploit/routersploit/core/http/http_client.py", line 2, in import requests File "/usr/local/lib/python3.9/dist-packages/requests/init.py", line 112, in from . import utils File "/usr/local/lib/python3.9/dist-packages/requests/utils.py", line 24, in from . import certs File "/usr/local/lib/python3.9/dist-packages/requests/certs.py", line 15, in from certifi import where ImportError: cannot import name 'where' from 'certifi' (/usr/local/lib/python3.9/dist-packages/certifi/init.py)

During handling of the above exception, another exception occurred:

Traceback (most recent call last): File "/root/routersploit/routersploit/interpreter.py", line 389, in command_run self.current_module.run() File "/root/routersploit/routersploit/modules/scanners/autopwn.py", line 77, in run for module in utils.iter_modules(directory): File "/root/routersploit/routersploit/core/exploit/utils.py", line 138, in iter_modules yield import_exploit(path) File "/root/routersploit/routersploit/core/exploit/utils.py", line 120, in import_exploit raise RoutersploitException( routersploit.core.exploit.exceptions.RoutersploitException: Error during loading 'routersploit/modules/exploits/generic/shellshock'

Error: cannot import name 'where' from 'certifi' (/usr/local/lib/python3.9/dist-packages/certifi/init.py)

It should be valid path to the module. Use key multiple times for completion.

During handling of the above exception, another exception occurred:

Traceback (most recent call last): File "/root/routersploit/rsf.py", line 29, in routersploit(sys.argv) File "/root/routersploit/rsf.py", line 25, in routersploit rsf.start() File "/root/routersploit/routersploit/interpreter.py", line 125, in start command_handler(args, **kwargs) File "/root/routersploit/routersploit/core/exploit/utils.py", line 177, in wrapper return fn(self, *args, **kwargs) File "/root/routersploit/routersploit/interpreter.py", line 394, in command_run print_error(traceback.format_exc(sys.exc_info())) File "/usr/lib/python3.9/traceback.py", line 167, in format_exc return "".join(format_exception(*sys.exc_info(), limit=limit, chain=chain)) File "/usr/lib/python3.9/traceback.py", line 120, in format_exception return list(TracebackException( File "/usr/lib/python3.9/traceback.py", line 493, in init context = TracebackException( File "/usr/lib/python3.9/traceback.py", line 508, in init self.stack = StackSummary.extract( File "/usr/lib/python3.9/traceback.py", line 340, in extract if limit >= 0: TypeError: '>=' not supported between instances of 'tuple' and 'int'

please help

d4rks0ul555 avatar Jan 19 '21 16:01 d4rks0ul555

Error similar to @RamezReZ's one. First AttributeError: 'Thread' object has no attribute 'isAlive' and then TypeError: '>=' not supported between instances of 'tuple' and 'int'... Between [*] 192.168.48.1:80 http exploits/routers/dlink/dsl_2730b_2780b_526b_dns_change Could not be verified and [-] 192.168.48.1:80 http exploits/routers/dlink/dsp_w110_rce is not vulnerable.

Thanks in advance for your kind help.

MuratOzsoyler avatar Jan 24 '21 17:01 MuratOzsoyler