Fix better detection of vulnerable router for linksys/eseries_themoon_rce exploit #734
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Status
**READY
Description
Better detection of vulnerable router in the exploit routers/linksys/eseries_themoon_rce
The exploit checks whether the returned response code is 200,301 or 302 but some webpages uses custom 404 which makes them look as 200 OK so the exploit assumes the machine is vulnerable but it is not.
Verification
./rsf.py
use exploits/routers/linksys/eseries_themoon_rce
set target 192.168.1.1
check
##Note
My router wasn't vulnerable to it but it returned as vulnnerable even
autopwn
also returned vulnerable