The remote host has an unprotected debug interface. An unauthenticated, remote attacker can exploit this to execute system commands and JASIC code.
Binary data scada_janitza_debug_svc.nbin
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3971
www.nessus.org/u?3e5abea9
www.janitza.com/experimental-downloads.html