The remote host is vulnerable to a flaw that would allow remote attackers to spoof trusted hosts.
The remote host is running Dropbear, a small, open-source SSH server. The version of Dropbear installed on the remote host is prior to 0.49.0, and by default has a flaw where the application fails to warn if the hostkey file has changed. An attacker exploiting this flaw would be able to execute a man-in-the-middle attack against the Dropbear server.
Upgrade to version 0.49.0 or higher.