Exploitationroutersembedded-devicesexploitsscannersbruteforcepenetration-testing

RouterSploit

RouterSploit is an open-source exploitation framework for embedded devices like routers. It includes exploits, scanners, credential testing modules, payloads, and generic attacks.

Description

RouterSploit is dedicated to penetration testing of embedded devices, particularly routers. It consists of modules for exploits that target identified vulnerabilities, creds modules for testing credentials against services like HTTP, SSH, and Telnet, scanners to check vulnerability status, payloads for various architectures, and generic attacks. The framework allows users to verify if a target is vulnerable before attempting exploitation.

Use cases include assessing router security by running specific exploits like Misfortune Cookie, using the autopwn scanner to automatically check multiple exploits, or brute-forcing credentials when stealth is not required. It supports both targeted attacks on known vulnerabilities and broad scanning across numerous router models and vendors such as Belkin, Asus, Netgear, D-Link, and others.

The tool operates in an interactive console (rsf) where modules are loaded, options configured, and attacks executed. It provides feedback on vulnerability status and successful credential discovery.

How It Works

RouterSploit uses a modular framework with exploits that check target vulnerability before exploitation, scanners like autopwn that run multiple exploit checks sequentially, and creds modules that perform brute-force attacks on services using specified usernames, passwords, threads, and paths. Modules interact via protocols like HTTP (with options for port, target URI), and report results such as vulnerability status or found credentials. It leverages Python dependencies for networking, cryptography, and SSH/Telnet support.

Installation

bash
sudo apt install routersploit

Flags

-m <module>Specify module to use
-s "<option> <value>"Set module option

Examples

Load the Misfortune Cookie exploit module
use exploits/multi/misfortune_cookie
Display target options like port and target for the module
rsf (Misfortune Cookie) > show options
Set the target IP address for the exploit
rsf (Misfortune Cookie) > set target 192.168.0.2
Check if the target is vulnerable to Misfortune Cookie
rsf (Misfortune Cookie) > check
Load the AutoPwn scanner module to check multiple exploits
use scanners/autopwn
Set target for AutoPwn scanner
rsf (AutoPwn) > set target 192.168.0.2
Run AutoPwn to scan for vulnerabilities across exploits
rsf (AutoPwn) > run
Load HTTP Basic Bruteforce credentials module
use creds/http_basic_bruteforce
Set target for HTTP basic auth brute force
rsf (HTTP Basic Bruteforce) > set target 192.168.0.2
Set password wordlist for brute force
rsf (HTTP Basic Bruteforce) > set passwords file:///usr/share/wordlists/nmap.lst
Execute HTTP basic authentication brute force attack
rsf (HTTP Basic Bruteforce) > run
Updated 2026-04-16kali.org ↗