Skip to content

NameError: name 'SnmpEngine' is not defined #885

@neet327

Description

@neet327

rsf (AutoPwn) > run
[*] Running module scanners/autopwn...

[] 192.168.1.1 Starting vulnerablity check...
[-] 192.168.1.1:21 ftp exploits/routers/technicolor/tg784_authbypass is not vulnerable
[-] 192.168.1.1:80 http exploits/generic/heartbleed is not vulnerable
[-] 192.168.1.1:80 http exploits/routers/zyxel/zywall_usg_extract_hashes is not vulnerable[-] 192.168.1.1:80 http exploits/routers/zyxel/p660hn_t_v2_rce is not vulnerable
[-] 192.168.1.1:80 http exploits/routers/zyxel/p660hn_t_v1_rce is not vulnerable
[-] 192.168.1.1:80 http exploits/routers/technicolor/dwg855_authbypass is not vulnerable
[-] 192.168.1.1:80 http exploits/routers/technicolor/tc7200_password_disclosure is not vulnerable
[-] 192.168.1.1:80 http exploits/routers/technicolor/tc7200_password_disclosure_v2 is not vulnerable
[-] 192.168.1.1:80 http exploits/routers/zyxel/d1000_wifi_password_disclosure is not vulnerable
[-] 192.168.1.1:22 ssh exploits/generic/ssh_auth_keys is not vulnerable
[-] 192.168.1.1:80 http exploits/routers/zyxel/d1000_rce is not vulnerable
[-] 192.168.1.1:8291 custom/tcp exploits/routers/mikrotik/winbox_auth_bypass_creds_disclosure is not vulnerable
[-] 192.168.1.1:22 ssh exploits/routers/mikrotik/routeros_jailbreak is not vulnerable
[-] 192.168.1.1:80 http exploits/routers/zte/f460_f660_backdoor is not vulnerable
[-] 192.168.1.1:80 http exploits/generic/shellshock is not vulnerable
[-] 192.168.1.1:80 http exploits/routers/ubiquiti/airos_6_x is not vulnerable
[
] 192.168.1.1:80 http exploits/routers/billion/billion_5200w_rce Could not be verified
[-] 192.168.1.1:80 http exploits/routers/asmax/ar_804_gu_rce is not vulnerable
[-] 192.168.1.1:80 http exploits/routers/zte/zxhn_h108n_wifi_password_disclosure is not vulnerable
[-] 192.168.1.1:80 http exploits/routers/tplink/archer_c2_c20i_rce is not vulnerable
[-] 192.168.1.1:80 http exploits/routers/asmax/ar_1004g_password_disclosure is not vulnerable
[-] 192.168.1.1:80 http exploits/routers/zte/zxv10_rce is not vulnerable
[] 192.168.1.1:80 http exploits/routers/shuttle/915wm_dns_change Could not be verified
[-] 192.168.1.1:80 http exploits/routers/billion/billion_7700nr4_password_disclosure is not vulnerable
[
] 192.168.1.1:80 http exploits/routers/asus/asuswrt_lan_rce Could not be verified
[-] 192.168.1.1:80 http exploits/routers/tplink/wdr842nd_wdr842n_configure_disclosure is not vulnerable
[-] 192.168.1.1:80 http exploits/routers/tplink/wdr740nd_wdr740n_path_traversal is not vulnerable
[-] 192.168.1.1:80 http exploits/routers/asus/rt_n16_password_disclosure is not vulnerable[-] 192.168.1.1:80 http exploits/routers/netsys/multi_rce is not vulnerable
[-] 192.168.1.1:80 http exploits/routers/tplink/wdr740nd_wdr740n_backdoor is not vulnerable
[-] 192.168.1.1:80 http exploits/routers/comtrend/ct_5361t_password_disclosure is not vulnerable
Exception in thread thread-1:
[-] 192.168.1.1:80 http exploits/routers/thomson/twg850_password_disclosure is not vulnerable
[-] 192.168.1.1:80 http exploits/routers/belkin/play_max_prce is not vulnerable
[-] 192.168.1.1:80 http exploits/routers/belkin/g_n150_password_disclosure is not vulnerable
[-] 192.168.1.1:80 http exploits/routers/belkin/n150_path_traversal is not vulnerable
[-] 192.168.1.1:80 http exploits/routers/belkin/g_plus_info_disclosure is not vulnerable
[] 192.168.1.1:80 http exploits/routers/cisco/secure_acs_bypass Could not be verified
[-] 192.168.1.1:80 http exploits/routers/belkin/auth_bypass is not vulnerable
[-] 192.168.1.1:80 http exploits/routers/tplink/archer_c9_admin_password_reset is not vulnerable
[-] 192.168.1.1:80 http exploits/routers/belkin/n750_rce is not vulnerable
[-] 192.168.1.1:80 http exploits/routers/cisco/firepower_management60_path_traversal is not vulnerable
[-] 192.168.1.1:80 http exploits/routers/cisco/rv320_command_injection is not vulnerable
[-] 192.168.1.1:80 http exploits/routers/cisco/unified_multi_path_traversal is not vulnerable
[
] 192.168.1.1:23 custom/tcp exploits/routers/cisco/catalyst_2960_rocem Could not be verified
Traceback (most recent call last):
File "/usr/lib/python3.13/threading.py", line 1043, in _bootstrap_inner
self.run()
~~~~~~~~^^
[-] 192.168.1.1:80 http exploits/routers/cisco/ucs_manager_rce is not vulnerable
File "/usr/lib/python3.13/threading.py", line 994, in run
self._target(*self._args, **self._kwargs)
~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/lib/python3/dist-packages/routersploit/modules/scanners/autopwn.py", line 172, in exploits_target_function
response = exploit.check()
File "/usr/lib/python3/dist-packages/routersploit/core/exploit/exploit.py", line 186, in wrapper
return fn(self, *args, **kwargs)
File "/usr/lib/python3/dist-packages/routersploit/modules/exploits/routers/thomson/twg849_info_disclosure.py", line 68, in check
snmp = snmp_client.get("private", "1.3.6.1.2.1.1.1.0")
File "/usr/lib/python3/dist-packages/routersploit/core/snmp/snmp_client.py", line 42, in get
return asyncio.run(self.get_cmd(
~~~~~~~~~~~^^^^^^^^^^^^^^
community_string,
^^^^^^^^^^^^^^^^^
...<2 lines>...
retries
^^^^^^^
))
^^
File "/usr/lib/python3.13/asyncio/runners.py", line 195, in run
return runner.run(main)
~~~~~~~~~~^^^^^^
File "/usr/lib/python3.13/asyncio/runners.py", line 118, in run
return self._loop.run_until_complete(task)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^^^^^^
File "/usr/lib/python3.13/asyncio/base_events.py", line 725, in run_until_complete
return future.result()
~~~~~~~~~~~~~^^
File "/usr/lib/python3/dist-packages/routersploit/core/snmp/snmp_client.py", line 59, in get_cmd
snmpEngine = SnmpEngine()
^^^^^^^^^^
NameError: name 'SnmpEngine' is not defined
[-] 192.168.1.1:80 http exploits/routers/cisco/dpc2420_info_disclosure is not vulnerable

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions