You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I got the password decoding the base64 string, i'm just missing the Username
rsf (Billion 7700NR4 Password Disclosure) > check
[+] Target is vulnerable
rsf (Billion 7700NR4 Password Disclosure) > run
[*] Running module exploits/routers/billion/billion_7700nr4_password_disclosure...
[+] Found strings: AbCdMzdFOUY5MkMwAA== <----- actual password here, the user is missing though.
[*] Trying to base64 decode
[+] Credentials found!
Login Password
----- --------
Traceback (most recent call last):
File "/home/username/Downloads/git/routersploit/routersploit/interpreter.py", line 389, in command_run
self.current_module.run()
File "/home/username/Downloads/git/routersploit/routersploit/modules/exploits/routers/billion/billion_7700nr4_password_disclosure.py", line 56, in run
print_table(("Login", "Password"), *creds)
File "/home/username/Downloads/git/routersploit/routersploit/core/exploit/printer.py", line 137, in print_table
"{:<{}}".format(element, fill[idx])
TypeError: unsupported format string passed to bytes.__format__
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "rsf.py", line 29, in <module>
routersploit(sys.argv)
File "rsf.py", line 25, in routersploit
rsf.start()
File "/home/userName/Downloads/git/routersploit/routersploit/interpreter.py", line 125, in start
command_handler(args, **kwargs)
File "/home/userName/Downloads/git/routersploit/routersploit/core/exploit/utils.py", line 177, in wrapper
return fn(self, *args, **kwargs)
File "/home/userName/Downloads/git/routersploit/routersploit/interpreter.py", line 394, in command_run
print_error(traceback.format_exc(sys.exc_info()))
File "/usr/lib/python3.7/traceback.py", line 167, in format_exc
return "".join(format_exception(*sys.exc_info(), limit=limit, chain=chain))
File "/usr/lib/python3.7/traceback.py", line 121, in format_exception
type(value), value, tb, limit=limit).format(chain=chain))
File "/usr/lib/python3.7/traceback.py", line 508, in __init__
capture_locals=capture_locals)
File "/usr/lib/python3.7/traceback.py", line 337, in extract
if limit >= 0:
TypeError: '>=' not supported between instances of 'tuple' and 'int'
Steps to Reproduce (for bugs)
routersploit
(latest version) from GitHubscanners/routers/router_scan
exploits/routers/multi/rom0
Your Environment
Current Behavior
It's crashing:
Expected Behavior
uhm… no error & shell? :)
The text was updated successfully, but these errors were encountered: