Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

The green hand give up. Connection Refused. #173

Open
yaunsine opened this issue Apr 1, 2023 · 1 comment
Open

The green hand give up. Connection Refused. #173

yaunsine opened this issue Apr 1, 2023 · 1 comment

Comments

@yaunsine
Copy link

yaunsine commented Apr 1, 2023

no method to sovle it, have read all the issus, waiting for dalao's answer. 🐶

D:\downloads\OpenWRTInvasion-master\OpenWRTInvasion-master>python remote_command_execution_vulnerability.py
Router IP address [press enter for using the default 'miwifi.com']: 192.168.31.1
Enter router admin password: [my_route_admin_password]
There two options to provide the files needed for invasion:
   1. Use a local TCP file server runing on random port to provide files in local directory `script_tools`.
   2. Download needed files from remote github repository. (choose this option only if github is accessable inside router device.)
Which option do you prefer? (default: 1)2
****************
router_ip_address: 192.168.31.1
stok: 79ab6110066ad677809f43d4c6bb1d28
file provider: remote github repository
****************
start uploading config file...
start exec command...
done! Now you can connect to the router using several options: (user: root, password: root)
* telnet 192.168.31.1
* ssh -oKexAlgorithms=+diffie-hellman-group1-sha1 -c 3des-cbc -o UserKnownHostsFile=/dev/null [email protected]
* ftp: using a program like cyberduck

D:\downloads\OpenWRTInvasion-master\OpenWRTInvasion-master>ssh -oKexAlgorithms=+diffie-hellman-group1-sha1 -c 3des-cbc -o UserKnownHostsFile=/dev/null [email protected]
ssh: connect to host 192.168.31.1 port 22: Connection refused

D:\downloads\OpenWRTInvasion-master\OpenWRTInvasion-master>ping 192.168.31.1

Pinging 192.168.31.1 with 32 bytes of data:
Reply from 192.168.31.1: bytes=32 time<1ms TTL=64
Reply from 192.168.31.1: bytes=32 time<1ms TTL=64
Reply from 192.168.31.1: bytes=32 time<1ms TTL=64
Reply from 192.168.31.1: bytes=32 time<1ms TTL=64

Ping statistics for 192.168.31.1:
    Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
    Minimum = 0ms, Maximum = 0ms, Average = 0ms

D:\downloads\OpenWRTInvasion-master\OpenWRTInvasion-master>
@yaunsine yaunsine changed the title Green hand abandon. Connection Refused. Green hand give up. Connection Refused. Apr 1, 2023
@yaunsine yaunsine changed the title Green hand give up. Connection Refused. The green hand give up. Connection Refused. Apr 1, 2023
@varkey
Copy link

varkey commented May 17, 2023

You don't necessarily need FTP, you can download the firmware directly to the Mi router. The unit I purchased from India (Flipkart) came with firmware 3.10.18 and FTP did not work as well.

#150 (comment)

Or if SSH is working, you can simply SCP the file to the device as well.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants