You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
(venv) python3 remote_command_execution_vulnerability.py
Router IP address [press enter for using the default 'miwifi.com']:
Enter router admin password: ###MYPASSWD###
There two options to provide the files needed for invasion:
1. Use a local TCP file server runing on random port to provide files in local directory `script_tools`.
2. Download needed files from remote github repository. (choose this option only if github is accessable inside router device.)
Which option do you prefer? (default: 1)1
****************
router_ip_address: miwifi.com
stok: ###MYSTOK###
file provider: local file server
****************
start uploading config file...
start exec command...
local file server is runing on 0.0.0.0:43881. root='script_tools'
Warning: the process has finished, but seems like ssh connection to the router is not working as expected.
* Maybe your firmware version is not supported, please have a look at https://github.com/acecilia/OpenWRTInvasion/blob/master/README.md#unsupported-routers-and-firmware-versions
* Anyway you can try it with: telnet miwifi.com
When I bought this router its 2.28.65 and I didn't connect it to the Internet.
I configured manually and flashed 2.28.62.
I can't telnet it or ssh it.
It seems to have a wrong setting of time but I fixed it later.
The text was updated successfully, but these errors were encountered:
It's output seemed like:
When I bought this router its 2.28.65 and I didn't connect it to the Internet.
I configured manually and flashed 2.28.62.
I can't telnet it or ssh it.
It seems to have a wrong setting of time but I fixed it later.
The text was updated successfully, but these errors were encountered: