Anyways, this is an interesting attack, as it's x86, ARM, and MIPS, so it's likely not "shellcode" based but a layer2/3 attack, and one that was well researched before they launched it.
Far too many diverse products, platforms, manufacturers and even types of devices for it to be a single attack. That would be the ultimate 0-day, and state/sophisticated actors don't waste even small 0-days on mass attacks.
It is all but guaranteed to be a database of either existing vulnerabilities or default credentials attacks.