If you wish to see egress and ingress network traffic for a given computer, you can install Wireshark and inspect the individual packets that are carried by a NIC. This can allow you to identify the given networking protocols in use on your computer. If you want to see all connections that are allowed on your PC you would also have to check the firewall settings for your machine (Advanced Firewall settings on Windows, nftables or iptables on GNU\Linux as two examples).
However, as you question regarding protocol identification is in regards to a vulnerable software package used for embedded systems it is close to certain you won't find anything on your PC. Despite this, the vulnerability may affect you as the list of affected devices as reported by ZDnet is pretty large (including routers and IoT devices). Contacting your manufacturer* and ensuring all firmware is kept up to date is likely your best bet to manage the risk.
I do not believe you could readily determine at-risk systems by checking network traffic for TCP/IP, as this is a hugely prevalent standard that pretty much everything will use. In addition determining the TCP/IP stack that a device is using would be easier to discover by administering the devices in question and determining all hardare/software loaded if possible.
*Manufacturers may not be able to provide any information regarding vulnerability, as mentioned in the ZDnet article.