You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
i have a Mi Router 4A (non gigabit) | MiWiFi Release 3.0.10 | Country Greece
OpenWRTInvasion-master % python3 remote_command_execution_vulnerability.py
Router IP address [press enter for using the default 'miwifi.com']: 192.168.31.1
Enter router admin password: 22222222
There two options to provide the files needed for invasion:
Use a local TCP file server runing on random port to provide files in local directory script_tools.
Download needed files from remote github repository. (choose this option only if github is accessable inside router device.)
Which option do you prefer? (default: 1)
router_ip_address: 192.168.31.1
stok: b7c2b50a3973817c0934b5291f2eee29
file provider: local file server
start uploading config file...
start exec command...
local file server is runing on 0.0.0.0:63088. root='script_tools'
Warning: the process has finished, but seems like ssh connection to the router is not working as expected.
start uploading config file...
start exec command...
Warning: the process has finished, but seems like ssh connection to the router is not working as expected.
i have a Mi Router 4A (non gigabit) | MiWiFi Release 3.0.10 | Country Greece
OpenWRTInvasion-master % python3 remote_command_execution_vulnerability.py
Router IP address [press enter for using the default 'miwifi.com']: 192.168.31.1
Enter router admin password: 22222222
There two options to provide the files needed for invasion:
script_tools
.Which option do you prefer? (default: 1)
router_ip_address: 192.168.31.1
stok: b7c2b50a3973817c0934b5291f2eee29
file provider: local file server
start uploading config file...
start exec command...
local file server is runing on 0.0.0.0:63088. root='script_tools'
Warning: the process has finished, but seems like ssh connection to the router is not working as expected.
OpenWRTInvasion-master % telnet 192.168.31.1
Trying 192.168.31.1...
telnet: connect to address 192.168.31.1: Connection refused
telnet: Unable to connect to remote host
The text was updated successfully, but these errors were encountered: