Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

Resolved issue with exploit (#766) #767

Merged
merged 1 commit into from
Apr 9, 2024
Merged

Resolved issue with exploit (#766) #767

merged 1 commit into from
Apr 9, 2024

Conversation

R3dIO
Copy link
Contributor

@R3dIO R3dIO commented Dec 2, 2021

Status

READY

Description

I have updated target_function within api_ros_default_creds.py in that I have replaced tcp_sock with tcp_client as it was returning a boolean value instead of tcp_client object because of which exception in Issue request ($766) happened. On fixing this there was another issue at library apiros_client.py where readstr function was checking for an empty string however the sk.recv method was returning None instead so added a check for None value.

Verification

Provide steps to test or reproduce the PR.

  1. Start ./rsf.py
  2. use creds/routers/mikrotik/api_ros_default_creds
  3. set target 192.168.1.1
  4. run

Checklist

  • Write module/feature
  • Write tests (Example)
  • Document how it works (Example)

Copy link
Contributor

@GH0st3rs GH0st3rs left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yeah you are right. Can you re-send this PR to my branch ? I'm trying to update this project

@lucyoa lucyoa merged commit d61c41b into threat9:master Apr 9, 2024
GH0st3rs pushed a commit to GH0st3rs/routersploit that referenced this pull request Sep 18, 2024
# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants