Freebox Server (Ultra V9/ Pop V8/ Delta V7 / Revolution V6 / Mini 4K)

  • État Fermée
  • Pourcentage achevé
    100%
  • Type Anomalie
  • Catégorie Freebox OS
  • Assignée à Personne
  • Système d'exploitation Freebox V9 (Ultra)
  • Sévérité Basse
  • Priorité Très Basse
  • Basée sur la version 4.7.8
  • Due pour la version Non décidée
  • Échéance Non décidée
  • Votes 1
  • Privée
Concerne le projet: Freebox Server (Ultra V9/ Pop V8/ Delta V7 / Revolution V6 / Mini 4K)
Ouverte par ftln - 24/02/2024
Dernière modification par mmakassikis - 26/02/2024

FS#39067 - Freebox

La mauvaise adresse IP s’affiche sur l’écran LCD

10.163.50.224

https://i.imgur.com/v7sDZF2.png


nmap -T4 -A -v -Pn 10.163.50.224

Host discovery disabled (-Pn). All addresses will be marked 'up' and scan times may be slower.
Starting Nmap 7.94 ( https://nmap.org ) at 2024-02-24 08:35 Romance Standard Time
NSE: Loaded 156 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 08:35
Completed NSE at 08:35, 0.00s elapsed
Initiating NSE at 08:35
Completed NSE at 08:35, 0.00s elapsed
Initiating NSE at 08:35
Completed NSE at 08:35, 0.00s elapsed
Initiating Parallel DNS resolution of 1 host. at 08:35
Completed Parallel DNS resolution of 1 host. at 08:35, 0.05s elapsed
Initiating SYN Stealth Scan at 08:35
Scanning 10.163.50.224 [1000 ports]
Discovered open port 554/tcp on 10.163.50.224
Discovered open port 53/tcp on 10.163.50.224
Discovered open port 8090/tcp on 10.163.50.224
Discovered open port 9091/tcp on 10.163.50.224
Discovered open port 5357/tcp on 10.163.50.224
Completed SYN Stealth Scan at 08:35, 0.06s elapsed (1000 total ports)
Initiating Service scan at 08:35
Scanning 5 services on 10.163.50.224
Completed Service scan at 08:36, 11.03s elapsed (5 services on 1 host)
Initiating OS detection (try #1) against 10.163.50.224
Initiating Traceroute at 08:36
Completed Traceroute at 08:36, 0.02s elapsed
Initiating Parallel DNS resolution of 1 host. at 08:36
Completed Parallel DNS resolution of 1 host. at 08:36, 0.00s elapsed
NSE: Script scanning 10.163.50.224.
Initiating NSE at 08:36
Completed NSE at 08:36, 8.69s elapsed
Initiating NSE at 08:36
Completed NSE at 08:36, 0.01s elapsed
Initiating NSE at 08:36
Completed NSE at 08:36, 0.00s elapsed
Nmap scan report for 10.163.50.224
Host is up (0.00049s latency).
Not shown: 995 closed tcp ports (reset)
PORT     STATE SERVICE VERSION
53/tcp   open  domain  dnsmasq 2.85
| dns-nsid: 
|_  bind.version: dnsmasq-2.85
554/tcp  open  rtsp    Freebox rtspd 1.2
|_rtsp-methods: DESCRIBE, OPTIONS, SETUP, TEARDOWN, PLAY, PAUSE
5357/tcp open  wsdapi?
| fingerprint-strings: 
|   GenericLines, RTSPRequest: 
|     HTTP/1.1 400 Bad Request
|     Content-Type: text/plain
|     Server: FbxWSD/1.0
|     Content-Length: 15
|     Connection: close
|     Request
|   GetRequest, HTTPOptions: 
|     HTTP/1.1 426 Upgrade Required
|     Upgrade: HTTP/1.1
|     Content-Type: text/plain
|     Server: FbxWSD/1.0
|     Content-Length: 20
|     Connection: close
|     Upgrade Required
|   RPCCheck: 
|     HTTP/1.1 414 URI Too Long
|     Content-Type: text/plain
|     Server: FbxWSD/1.0
|     Content-Length: 16
|     Connection: close
|_    Long
8090/tcp open  http    nginx
| http-methods: 
|_  Supported Methods: GET HEAD
|_http-title: Freebox :: Internet connection problem
|_http-favicon: Unknown favicon MD5: 9562B5FD4C5901E887C80F31827BE9A6
9091/tcp open  http    nginx
|_http-title: 404 Not Found
| http-methods: 
|_  Supported Methods: GET HEAD POST
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port5357-TCP:V=7.94%I=7%D=2/24%Time=65D99C5A%P=i686-pc-windows-windows%
SF:r(GenericLines,80,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\
SF:x20text/plain\r\nServer:\x20FbxWSD/1\.0\r\nContent-Length:\x2015\r\nCon
SF:nection:\x20close\r\n\r\n400\x20Bad\x20Request")%r(GetRequest,9D,"HTTP/
SF:1\.1\x20426\x20Upgrade\x20Required\r\nUpgrade:\x20HTTP/1\.1\r\nContent-
SF:Type:\x20text/plain\r\nServer:\x20FbxWSD/1\.0\r\nContent-Length:\x2020\
SF:r\nConnection:\x20close\r\n\r\n426\x20Upgrade\x20Required")%r(HTTPOptio
SF:ns,9D,"HTTP/1\.1\x20426\x20Upgrade\x20Required\r\nUpgrade:\x20HTTP/1\.1
SF:\r\nContent-Type:\x20text/plain\r\nServer:\x20FbxWSD/1\.0\r\nContent-Le
SF:ngth:\x2020\r\nConnection:\x20close\r\n\r\n426\x20Upgrade\x20Required")
SF:%r(RTSPRequest,80,"HTTP/1\.1\x20400\x20Bad\x20Request\r\nContent-Type:\
SF:x20text/plain\r\nServer:\x20FbxWSD/1\.0\r\nContent-Length:\x2015\r\nCon
SF:nection:\x20close\r\n\r\n400\x20Bad\x20Request")%r(RPCCheck,82,"HTTP/1\
SF:.1\x20414\x20URI\x20Too\x20Long\r\nContent-Type:\x20text/plain\r\nServe
SF:r:\x20FbxWSD/1\.0\r\nContent-Length:\x2016\r\nConnection:\x20close\r\n\
SF:r\n414\x20URI\x20Too\x20Long");
Device type: general purpose
Running: Linux 4.X|5.X
OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5
OS details: Linux 4.15 - 5.8
Uptime guess: 32.018 days (since Tue Jan 23 08:09:48 2024)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=258 (Good luck!)
IP ID Sequence Generation: All zeros
Service Info: Device: media device

TRACEROUTE (using port 587/tcp)
HOP RTT     ADDRESS
1   1.00 ms 10.163.50.224

NSE: Script Post-scanning.
Initiating NSE at 08:36
Completed NSE at 08:36, 0.00s elapsed
Initiating NSE at 08:36
Completed NSE at 08:36, 0.00s elapsed
Initiating NSE at 08:36
Completed NSE at 08:36, 0.00s elapsed
Read data files from: C:\Program Files (x86)\Nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 22.30 seconds
           Raw packets sent: 1032 (46.218KB) | Rcvd: 1027 (41.850KB)
Fermée par  mmakassikis
26.02.2024 07:50
Raison de la fermeture :  Ticket invalide

Chargement...

Activer les raccourcis clavier

Liste des tâches

Détails de la tâche

Édition de la tâche