Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.
220 forward FTP server (Version 6.00LS) ready. 530 User anonymous unknown. 214- The following commands are recognized (* =>'s unimplemented). USER PORT TYPE MLFL* MRCP* DELE SYST XMKD XCUP PASS LPRT STRU MAIL* ALLO CWD FEAT RMD STOU ACCT* EPRT MODE MSND* REST XCWD STAT XRMD SIZE SMNT* PASV RETR MSOM* RNFR LIST HELP PWD MDTM REIN* LPSV STOR MSAM* RNTO NLST NOOP XPWD QUIT EPSV APPE MRSQ* ABOR SITE MKD CDUP 214 Direct comments to ftp-bugs@forward. 211- Extensions supported: MDTM REST STREAM SIZE 211 End.
HTTP/1.1 200 OK Date: Tue, 28 Jan 2025 01:51:43 GMT Server: Apache/2.4.25 (FreeBSD) OpenSSL/1.0.2k-freebsd PHP/5.6.31 X-Powered-By: PHP/5.6.31 Content-Length: 668 Content-Type: text/html; charset=UTF-8
HTTP/1.1 200 OK Date: Tue, 21 Jan 2025 10:59:56 GMT Server: Apache/2.4.25 (FreeBSD) OpenSSL/1.0.2k-freebsd PHP/5.6.31 Last-Modified: Wed, 22 Mar 2017 11:16:00 GMT ETag: "2d-54b4fe2aae564" Accept-Ranges: bytes Content-Length: 45 Content-Type: text/html <html><body><h1>It works!</h1></body></html>
Shodan ® - All rights reserved