Skip to content

RouterSploit

Exploitation framework for embedded devices

Description

RouterSploit is an open-source exploitation framework dedicated to embedded devices. It provides modules for exploiting routers, IoT devices, and other embedded systems with known vulnerabilities, default credentials, and misconfiguration.

Installation

BASH
git clone https://github.com/threat9/routersploit
cd routersploit
pip install -r requirements.txt
python3 rsf.py

Basic Usage

BASH
# Launch
python3 rsf.py

# Auto-scan router
rsf > use scanners/autopwn
rsf > set target 192.168.1.1
rsf > run

# Check default credentials
rsf > use creds/routers/router_default_creds
rsf > set target 192.168.1.1
rsf > run

Advanced Usage

BASH
# Exploit specific vulnerability
rsf > use exploits/routers/dlink/dir_825_path_traversal
rsf > set target 192.168.1.1
rsf > check          # Test if vulnerable
rsf > run            # Exploit

# Camera exploits
rsf > use exploits/cameras/
# Tab for available camera exploits

# Generic modules
rsf > use generic/upnp_list     # UPnP enumeration

# Credential categories
rsf > use creds/routers/         # Router default creds
rsf > use creds/cameras/         # Camera default creds
rsf > use creds/http_basic_default  # HTTP basic auth
rsf > use creds/ftp_default         # FTP default creds
rsf > use creds/ssh_default         # SSH default creds
rsf > use creds/telnet_default      # Telnet default creds

Common Workflows

BASH
# IoT device audit
rsf > use scanners/autopwn
rsf > set target 192.168.1.0/24
rsf > run
# Reviews all devices for known vulns and default creds