Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.
220 ProFTPD 1.3.5 Server (CW) [::ffff:66.154.68.24] 530 Login incorrect. 214-The following commands are recognized (* =>'s unimplemented): 214-CWD XCWD CDUP XCUP SMNT* QUIT PORT PASV 214-EPRT EPSV ALLO* RNFR RNTO DELE MDTM RMD 214-XRMD MKD XMKD PWD XPWD SIZE SYST HELP 214-NOOP FEAT OPTS AUTH* CCC* CONF* ENC* MIC* 214-PBSZ* PROT* TYPE STRU MODE RETR STOR STOU 214-APPE REST ABOR USER PASS ACCT* REIN* LIST 214-NLST STAT SITE MLSD MLST 214 Direct comments to root@pup1116.conepuppy.com 211-Features: MFF modify;UNIX.group;UNIX.mode; REST STREAM MLST modify*;perm*;size*;type*;unique*;UNIX.group*;UNIX.mode*;UNIX.owner*; UTF8 LANG en-US* EPRT EPSV MDTM TVFS MFMT SIZE 211 End
HTTP/1.1 200 OK Date: Wed, 19 Mar 2025 15:45:44 GMT Server: Apache/2.4.10 (Debian) Vary: Accept-Encoding Transfer-Encoding: chunked Content-Type: text/html; charset=UTF-8
SNMP: Versions: 3 Engine Boots: 272 Engineid Data: 80001f888079f6920b0702e55800000000 Enterprise: 8072 Engine Time: 21:52:15
Shodan ® - All rights reserved