You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
! ANY INCOMPLETE REPORT WILL BE CLOSED RIGHT AWAY !
Steps to Reproduce (for bugs)
use exploits/routers/linksys/eseries_themoon_rce
set target 192.168.2.1
exploit
?
Your Environment
RouterSploit Version used: 3.4.1
Operating System and version: Kali Linux 2023.2
Python Version: 3.10.8
Python Environment: ( python3 -m pip freeze )
This isn't a bug but I'm asking for help, I got a 'cmd> ' shell on my Bell router using exploits/routers/linksys/eseries_themoon_rce, I got the message saying "[*] It is blind command injection - response is not available" and that's fine but I still want to know what commands I am able to execute, for example creating a port forwarding rule. Having a shell is cool and all but useless if you don't know how to use it, send any sources that can help explain, thank you.
The text was updated successfully, but these errors were encountered:
! ANY INCOMPLETE REPORT WILL BE CLOSED RIGHT AWAY !
Steps to Reproduce (for bugs)
Your Environment
python3 -m pip freeze
)This isn't a bug but I'm asking for help, I got a 'cmd> ' shell on my Bell router using exploits/routers/linksys/eseries_themoon_rce, I got the message saying "[*] It is blind command injection - response is not available" and that's fine but I still want to know what commands I am able to execute, for example creating a port forwarding rule. Having a shell is cool and all but useless if you don't know how to use it, send any sources that can help explain, thank you.
The text was updated successfully, but these errors were encountered: