Thursday, April 10, 2025
HomeExploitation ToolsRouterSploit - Exploitation Framework for Embedded devices

RouterSploit – Exploitation Framework for Embedded devices

Published on

SIEM as a Service

Follow Us on Google News

The RouterSploit Framework is an open-source exploitation framework devoted to embedded devices. It includes various modules that aid penetration testing operations:

  • exploits – modules that take advantage of identified vulnerabilities
  • creds – modules designed to test credentials against network services
  • scanners – modules that check if a target is vulnerable to any exploit

Requirements

  • gnureadline (OSX only)
  • requests
  • paramiko
  • beautifulsoup4
  • pysnmp

Installation

root@kali:~# apt-get install routersploit

Usage Exploits

The routersploit is a similar tool to Metasploit, very easy to create more modules. Anyone can extend the tool easily with the help of exploit databases.

To get the code skeleton.

- Advertisement - Google News

Also Read    p0f – Passive Traffic Analysis OS Fingerprinting and Forensics Penetration Testing Tool.

It is a critical vulnerability that allows an attacker to take remote control of a router connected to the Internet and it can be fixed only by hardware vendors.

root@kali:~# routersploitrsf > use exploits/multi/misfortune_cookiersf (Misfortune Cookie) > show options

Scanner

Scanner Quickly checks the target is vulnerable to any exploit, here we are to use autopwn scanners for all vulnerabilities.

rsf use scanner/autopwnrsf (Autopwn) > show optionsrsf (Autopwn) > set target IPrsf (Autopwn) > run
Exploitation Framework for Embedded devices - RouterSploit
Exploitation Framework for Embedded devices - RouterSploit

CREDS

RouterSploit has various creds modules that can brute force various services, including HTTP, SSH, and Telnet.

Services supported:

  • ftp
  • ssh
  • telnet
  • http basic auth
  • http digest auth
  • http form auth
  • snmp

As like every brute force tool you should prepare a wordlist, every service has two modules for reference (ftp_bruteforce,ftp_default)

ftp_default as the name indicates will check for default credentials and the process will be completed in minutes.

ftp_bruteforce does a dictionary account over single or multiple user accounts with credentials provided in the list.

You can find the video Tutorial on the GitHub page.

  • Author: Reverse Shell Security
  • License: BSD-3-clause

Also, Read

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

The State of AI Malware and Defenses Against It

AI has recently been added to the list of things that keep cybersecurity leaders...

Rogue Account‑Creation Flaw Leaves 100 K WordPress Sites Exposed

A severe vulnerability has been uncovered in the SureTriggers WordPress plugin, which could leave...

GOFFEE Deploys PowerModul in Coordinated Strikes on Government and Energy Networks

The threat actor known as GOFFEE has launched a series of targeted attacks against...

A Seven‑Year‑Old Cisco Flaw Now Lets Hackers Execute Code Remotely on Network Gear

A Cisco’s Smart Install protocol (CVE-2018-0171), first patched in 2018, remains a pervasive threat...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Cable: Powerful Post-Exploitation Toolkit for Active Directory Attacks

Cybersecurity researchers are raising alarms about Cable, a potent open-source post-exploitation toolkit designed to exploit...

Windows 11 BitLocker Bypassed to Extract Encryption Keys

An attacker with physical access can abruptly restart the device and dump RAM, as...

ConvoC2 – A Red Teamers Tool To Execute Commands on Hacked Hosts Via Microsoft Teams

A stealthy Command-and-Control (C2) infrastructure Red Team tool named ConvoC2 showcases how cyber attackers...