Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.
HTTP/1.1 200 OK Date: Mon, 07 Apr 2025 13:03:47 GMT Server: Apache X-Powered-By: PHP/7.4.33 Upgrade: h2,h2c Connection: Upgrade Content-Length: 0 Content-Type: text/html; charset=UTF-8
HTTP/1.1 200 OK Date: Fri, 21 Mar 2025 05:06:38 GMT Server: Apache X-Powered-By: PHP/7.4.33 Upgrade: h2,h2c Connection: Upgrade Content-Length: 0 Content-Type: text/html; charset=UTF-8
Certificate: Data: Version: 3 (0x2) Serial Number: 04:a9:72:a5:14:90:59:b2:f4:d7:d8:6c:d6:b3:84:2b:e5:31 Signature Algorithm: ecdsa-with-SHA384 Issuer: C=US, O=Let's Encrypt, CN=E6 Validity Not Before: Feb 13 04:18:09 2025 GMT Not After : May 14 04:18:08 2025 GMT Subject: CN=*.nloja.com Subject Public Key Info: Public Key Algorithm: id-ecPublicKey Public-Key: (256 bit) pub: 04:8d:ee:24:69:07:f8:21:73:45:e9:09:b6:ad:66: fe:f6:f9:94:c3:96:8c:7f:cc:87:0b:e9:2e:1e:6b: c1:8e:0c:a9:6d:65:ee:0d:71:cf:08:5d:2d:7c:45: 71:1d:a6:23:55:1d:a1:61:49:26:3f:39:56:3e:17: ba:5b:33:e4:f5 ASN1 OID: prime256v1 NIST CURVE: P-256 X509v3 extensions: X509v3 Key Usage: critical Digital Signature X509v3 Extended Key Usage: TLS Web Server Authentication, TLS Web Client Authentication X509v3 Basic Constraints: critical CA:FALSE X509v3 Subject Key Identifier: 1A:6E:D0:F3:40:14:29:31:D7:CE:2D:61:99:63:53:26:56:2C:B6:B2 X509v3 Authority Key Identifier: 93:27:46:98:03:A9:51:68:8E:98:D6:C4:42:48:DB:23:BF:58:94:D2 Authority Information Access: OCSP - URI:http://e6.o.lencr.org CA Issuers - URI:http://e6.i.lencr.org/ X509v3 Subject Alternative Name: DNS:*.nloja.com X509v3 Certificate Policies: Policy: 2.23.140.1.2.1 CT Precertificate SCTs: Signed Certificate Timestamp: Version : v1 (0x0) Log ID : CC:FB:0F:6A:85:71:09:65:FE:95:9B:53:CE:E9:B2:7C: 22:E9:85:5C:0D:97:8D:B6:A9:7E:54:C0:FE:4C:0D:B0 Timestamp : Feb 13 05:16:40.197 2025 GMT Extensions: none Signature : ecdsa-with-SHA256 30:45:02:20:67:F9:CF:5A:E2:73:44:B4:DB:D0:41:A7: 6F:B6:38:C1:04:04:CE:EF:7A:19:2A:3E:B0:3E:85:CC: D7:A2:4B:AE:02:21:00:AC:81:78:95:D1:4C:9E:1B:E5: 9D:26:CF:A1:2A:B3:12:B5:6D:09:90:73:D8:EB:BC:E6: F9:F1:B4:D1:D1:E4:3F Signed Certificate Timestamp: Version : v1 (0x0) Log ID : 4E:75:A3:27:5C:9A:10:C3:38:5B:6C:D4:DF:3F:52:EB: 1D:F0:E0:8E:1B:8D:69:C0:B1:FA:64:B1:62:9A:39:DF Timestamp : Feb 13 05:16:40.171 2025 GMT Extensions: none Signature : ecdsa-with-SHA256 30:44:02:20:0D:BA:FC:5F:97:14:D0:54:99:E8:A6:9A: EB:CE:0E:9D:BD:11:EA:58:6A:51:88:07:03:7E:E0:5D: 8B:AE:04:9E:02:20:1F:92:B0:41:3D:ED:6F:95:AA:47: 64:11:2B:89:14:38:D3:5D:66:64:82:C0:A2:20:39:D4: 48:4E:64:30:1E:32 Signature Algorithm: ecdsa-with-SHA384 Signature Value: 30:65:02:30:1d:c0:a2:f1:96:84:e9:cb:b2:b4:b7:10:fe:cc: 6a:e5:8a:54:26:75:b1:7c:0c:76:ca:57:d7:26:8a:6a:eb:10: 12:50:59:10:fc:35:d5:b1:53:7f:bb:21:0f:98:c4:8b:02:31: 00:e5:c4:e8:41:ac:0f:0a:9c:8d:aa:4d:50:2e:d0:21:c0:f6: 85:ec:6a:73:bf:06:0c:e8:88:61:d1:f8:c8:80:50:b7:4d:74: f4:ff:fa:14:f2:74:70:2e:88:3e:9e:8e:e5
+OK Dovecot ready.
220 ProFTPD 1.3.1 Server (ProFTPD)\r\n500 command not understood\r\n
This is an unrestricted telnet server.\r\nPlease do not user for production purposes\r\n\r\n#
220 ESMTP Postfix (Debian/GNU)\r\n
+OK Dovecot ready.\r\n
220 ProFTPD 1.3.1 Server (ProFTPD)
OK [CAPABILITY LOGIN-REFERRALS ID ENABLE IDLE AUTH=PLAIN] Dovecot ready.
Shodan ® - All rights reserved