Malicious users exploiting this vulnerability may be able to read and/or write information to shared directories.
This may also include IPC services and lead to remote code execution.
Severity: high
Fingerprint: 22420ce026fa767d3962741c23bfd32f75afa13eb25d195e7201d6894041144f
Found open SMB shares with Guest login ADMIN$ C$ D$ E$ IPC$ mail print$ TOSHIBA e-STUDIO2820C PCL6 V4 Users
Severity: high
Fingerprint: 22420ce026fa767d3962741c23bfd32f75afa13eb25d195e7201d6891e664dc2
Found open SMB shares with Guest login ADMIN$ C$ D$ E$ IPC$ mail Users
Open service 197.44.84.34:445
2024-09-15 23:49
SMB NTLMSSP handshake results: Found Windows 10.0 build 19041 NbComputerName: HQ NbDomainName: HQ DNSComputerName: HQ DNSDomainName: HQ
Open service 197.44.84.34:445
2024-09-13 23:24
SMB NTLMSSP handshake results: Found Windows 10.0 build 19041 NbComputerName: HQ NbDomainName: HQ DNSComputerName: HQ DNSDomainName: HQ
Open service 197.44.84.34:445
2024-09-11 00:00
SMB NTLMSSP handshake results: Found Windows 10.0 build 19041 NbComputerName: HQ NbDomainName: HQ DNSComputerName: HQ DNSDomainName: HQ
Open service 197.44.84.34:445
2024-09-07 20:48
SMB NTLMSSP handshake results: Found Windows 10.0 build 19041 NbComputerName: HQ NbDomainName: HQ DNSComputerName: HQ DNSDomainName: HQ
Open service 197.44.84.34:445
2024-09-07 20:48
HTTP/1.1 307 Temporary Redirect Location: http://megaplusredirection.tedata.net/VDSL-Redirection_100.html Connection: close
Open service 197.44.84.34:445
2024-08-17 21:26
SMB NTLMSSP handshake results: Found Windows 10.0 build 19041 NbComputerName: HQ NbDomainName: HQ DNSComputerName: HQ DNSDomainName: HQ
Open service 197.44.84.34:445
2024-08-11 20:59
SMB NTLMSSP handshake results: Found Windows 10.0 build 19041 NbComputerName: HQ NbDomainName: HQ DNSComputerName: HQ DNSDomainName: HQ
Open service 197.44.84.34:445
2024-08-09 19:54
SMB NTLMSSP handshake results: Found Windows 10.0 build 19041 NbComputerName: HQ NbDomainName: HQ DNSComputerName: HQ DNSDomainName: HQ
Open service 197.44.84.34:445
2024-08-07 23:30
SMB NTLMSSP handshake results: Found Windows 10.0 build 19041 NbComputerName: HQ NbDomainName: HQ DNSComputerName: HQ DNSDomainName: HQ