Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.
9.9.5-9+deb8u19-Debian Resolver name: cr2.vpn
VPN (IKE) Initiator SPI: 316e3436666b6465 Responder SPI: 3863697569386763 Next Payload: RESERVED Version: 2.0 Exchange Type: DOI Specific Use Flags: Encryption: False Commit: False Authentication: False Message ID: 00000000 Length: 36
\xc8\x02\x00E\x00\x00\x00\x00\x00\x00\x00\x01\x80\x08\x00\x00\x00\x00\x00\x04\x80\x08\x00\x00\x00\t\xff \x80)\x00\x00\x00\x01\x00\x02\x00\x06Specify your assigned tunnel ID
PPTP: Firmware: 1 Hostname: local Vendor: linux
SSH-2.0-OpenSSH_7.0 Key type: ssh-rsa Key: AAAAB3NzaC1yc2EAAAADAQABAAABAQC9ggFlV0mWsYscyEYSXUx0uCvoM8hOm2GL94ndHmVgzODu gp/p/jB2TjYbzIhSwmIrgVdXc64YEDH0Ycu0NXMY5fYP2mc+74kAwBr+R2qkz9L+zQlDUDAtP4kX kpWuoxAekYOglhPHcmwjPx0Buu8ucOadSzQRqmXZqOVZb1uj3/D9izYUdL5Fdb4n0KjqUkO71GJG BODBrFPNIQLGvW3ZAEVYAbdG63r7v7ZaPwK4KhcehqJ0lcqdXHczyLjMhLb8oj1XYpJ6r3PUfR3y jZSPl4+K1i4MTpY2XFiqkUoJFgJERZ1pBr+ht9VdCRKjEZCPcbEQzzgIRHRZSI4du3cN Fingerprint: 6c:68:c6:4f:07:42:58:9a:b6:56:09:ed:b8:a4:ad:e8 Kex Algorithms: curve25519-sha256@libssh.org ecdh-sha2-nistp256 ecdh-sha2-nistp384 ecdh-sha2-nistp521 diffie-hellman-group-exchange-sha256 diffie-hellman-group14-sha1 Server Host Key Algorithms: ssh-rsa ecdsa-sha2-nistp521 Encryption Algorithms: chacha20-poly1305@openssh.com aes128-ctr aes192-ctr aes256-ctr aes128-gcm@openssh.com aes256-gcm@openssh.com MAC Algorithms: umac-64-etm@openssh.com umac-128-etm@openssh.com hmac-sha2-256-etm@openssh.com hmac-sha2-512-etm@openssh.com hmac-sha1-etm@openssh.com umac-64@openssh.com umac-128@openssh.com hmac-sha2-256 hmac-sha2-512 hmac-sha1 Compression Algorithms: none zlib@openssh.com
Shodan ® - All rights reserved