Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2020-5902
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, the Traffic Management User Interface (TMUI), also referred to as the Configuration utility, has a Remote Code Execution (RCE) vulnerability in undisclosed pages.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
F5 BIG-IP 路径遍历漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
F5 BIG-IP是美国F5公司的一款集成了网络流量管理、应用程序安全管理、负载均衡等功能的应用交付平台。 F5 BIG-IP中存在路径遍历漏洞。攻击者可利用该漏洞执行任意的系统命令、创建或删除文件,关闭服务/执行任意的Java代码,可能完全入侵系统。以下产品及版本受到影响:F5 BIG-IP 15.1.0版本,15.0.0版本,14.1.0版本至14.1.2版本,13.1.0版本至13.1.3版本,12.1.0版本至12.1.5版本,11.6.1版本至11.6.5版本。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-BIG-IP 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, 11.6.1-11.6.5.1 -
II. Public POCs for CVE-2020-5902
#POC DescriptionSource LinkShenlong Link
1CVE-2020-5902https://github.com/dwisiswant0/CVE-2020-5902POC Details
2Automated script for F5 BIG-IP scanner (CVE-2020-5902) using hosts retrieved from Shodan API.https://github.com/aqhmal/CVE-2020-5902-ScannerPOC Details
3CVE-2020-5902 BIG-IPhttps://github.com/jas502n/CVE-2020-5902POC Details
4POC code for checking for this vulnerability. Since the code has been released, I decided to release this one as well. Patch Immediately!https://github.com/ar0dd/CVE-2020-5902POC Details
5Proof of concept for CVE-2020-5902https://github.com/yassineaboukir/CVE-2020-5902POC Details
6Nonehttps://github.com/rwincey/CVE-2020-5902-NSEPOC Details
7Proof of Concept for CVE-2020-5902https://github.com/un4gi/CVE-2020-5902POC Details
8Nonehttps://github.com/nsflabs/CVE-2020-5902POC Details
9exploit code for F5-Big-IP (CVE-2020-5902)https://github.com/yasserjanah/CVE-2020-5902POC Details
10BIG-IP F5 Remote Code Executionhttps://github.com/JSec1337/RCE-CVE-2020-5902POC Details
11Python script to exploit F5 Big-IP CVE-2020-5902 https://github.com/dunderhay/CVE-2020-5902POC Details
12cve-2020-5902 POC exploithttps://github.com/r0ttenbeef/cve-2020-5902POC Details
13Nonehttps://github.com/sv3nbeast/CVE-2020-5902_RCEPOC Details
14CVE-2020-5902 scannerhttps://github.com/cybersecurityworks553/scanner-CVE-2020-5902POC Details
15批量扫描CVE-2020-5902,远程代码执行,已测试https://github.com/lijiaxing1997/CVE-2020-5902-POC-EXPPOC Details
16dummy pochttps://github.com/qlkwej/poc-CVE-2020-5902POC Details
17Nonehttps://github.com/Zinkuth/F5-BIG-IP-CVE-2020-5902POC Details
18Python script to check CVE-2020-5902 (F5 BIG-IP devices).https://github.com/0xAbdullah/CVE-2020-5902POC Details
19CVE-2020-5902https://github.com/jinnywc/CVE-2020-5902POC Details
20Patch F5 appliance CVE-2020-5902https://github.com/GoodiesHQ/F5-PatchPOC Details
21F5 BIG-IP Scanner (CVE-2020-5902)https://github.com/jiansiting/CVE-2020-5902POC Details
22Fix CVE-2020-5902https://github.com/wdlid/CVE-2020-5902-fixPOC Details
23Nonehttps://github.com/Any3ite/CVE-2020-5902-F5BIGPOC Details
24Nonehttps://github.com/k3nundrum/CVE-2020-5902POC Details
25Scan from a given list for F5 BIG-IP and check for CVE-2020-5902https://github.com/inho28/CVE-2020-5902-F5-BIGIPPOC Details
26F5 mass scanner and CVE-2020-5902 checkerhttps://github.com/cristiano-corrado/f5_scannerPOC Details
27POChttps://github.com/ajdumanhug/CVE-2020-5902POC Details
28F5 BIG-IP 任意文件读取+远程命令执行RCEhttps://github.com/zhzyker/CVE-2020-5902POC Details
29It is a small script to fetch out the subdomains/ip vulnerable to CVE-2020-5902 written in bashhttps://github.com/GovindPalakkal/EvilRipPOC Details
30Nonehttps://github.com/dnerzker/CVE-2020-5902POC Details
31A powershell script to check vulnerability CVE-2020-5902 of ip listhttps://github.com/renanhsilva/checkvulnCVE20205902POC Details
32F5 BIG IP Scanner for CVE-2020-5902https://github.com/halencarjunior/f5scanPOC Details
33Script para validar CVE-2020-5902 hecho en Go.https://github.com/deepsecurity-pe/GoF5-CVE-2020-5902POC Details
34Nonehttps://github.com/Shu1L/CVE-2020-5902-fofa-scanPOC Details
35F5 Big-IP CVE-2020-5902 mass exploiter/fuzzer.https://github.com/d4rk007/F5-Big-IP-CVE-2020-5902-mass-exploiterPOC Details
36Simple Vulnerability Checker Wrote by me "@TheCyberViking" and A fellow Researcher who wanted to be left Nameless... you know who you are you beautiful bitchhttps://github.com/TheCyberViking/CVE-2020-5902-Vuln-CheckerPOC Details
37Exploits for CVE-2020-5902 POC https://github.com/itsjeffersonli/CVE-2020-5902POC Details
38Checker CVE-2020-5902: BIG-IP versions 15.0.0 through 15.1.0.3, 14.1.0 through 14.1.2.5, 13.1.0 through 13.1.3.3, 12.1.0 through 12.1.5.1, and 11.6.1 through 11.6.5.1 suffer from Traffic Management User Interface (TMUI) arbitrary file read and command execution vulnerabilities.https://github.com/MrCl0wnLab/checker-CVE-2020-5902POC Details
39批量检测CVE-2020-5902https://github.com/qiong-qi/CVE-2020-5902-POCPOC Details
40F5 BIG-IP RCE CVE-2020-5902 automatic check toolhttps://github.com/theLSA/f5-bigip-rce-cve-2020-5902POC Details
41CVE-2020-5902https://github.com/Al1ex/CVE-2020-5902POC Details
42Nonehttps://github.com/freeFV/CVE-2020-5902-fofa-scanPOC Details
43Nonehttps://github.com/momika233/cve-2020-5902POC Details
44GUIhttps://github.com/rockmelodies/CVE-2020-5902-rce-guiPOC Details
45Mass exploit for CVE-2020-5902https://github.com/5l1v3r1/CVE-2020-5902-MassPOC Details
46Nonehttps://github.com/f5devcentral/cve-2020-5902-ioc-bigip-checkerPOC Details
47A network detection package for CVE-2020-5902, a CVE10.0 vulnerability affecting F5 Networks, Inc BIG-IP devices.https://github.com/corelight/CVE-2020-5902-F5BigIPPOC Details
48Automated F5 Big IP Remote Code Execution (CVE-2020-5902) Scanner Written In Python 3https://github.com/PushpenderIndia/CVE-2020-5902-ScannerPOC Details
49[CVE-2020-5902] F5 BIG-IP Remote Code Execution (RCE)https://github.com/murataydemir/CVE-2020-5902POC Details
50Nonehttps://github.com/superzerosec/cve-2020-5902POC Details
51(CVE-2020-5902) BIG IP F5 TMUI RCE Vulnerability RCE PoC/ Test Script https://github.com/ludy-dev/BIG-IP-F5-TMUI-RCE-VulnerabilityPOC Details
52simple bash script of F5 BIG-IP TMUI Vulnerability CVE-2020-5902 checkerhttps://github.com/faisalfs10x/F5-BIG-IP-CVE-2020-5902-shodan-scannerPOC Details
53Auto exploit RCE CVE-2020-5902 https://github.com/haisenberg/CVE-2020-5902POC Details
54BIGIP CVE-2020-5902 Exploit POC and automation scanning vulnerabilityhttps://github.com/z3n70/CVE-2020-5902POC Details
55Nonehttps://github.com/amitlttwo/CVE-2020-5902POC Details
56Exploits for CVE-2020-5902 POC https://github.com/flyopenair/CVE-2020-5902POC Details
57A simple workflow that runs all BigIP related nuclei templates on a given target.https://github.com/projectdiscovery/nuclei-templates/blob/main/workflows/bigip-workflow.yamlPOC Details
58F5 BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, the Traffic Management User Interface (TMUI), also referred to as the Configuration utility, has a Remote Code Execution (RCE) vulnerability in undisclosed pages.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2020/CVE-2020-5902.yamlPOC Details
59Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/F5%20BIG-IP%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2020-5902.mdPOC Details
60CVE-2020-5902https://github.com/B1ack4sh/Blackash-CVE-2020-5902POC Details
61CVE-2020-5902https://github.com/Ashwesker/Blackash-CVE-2020-5902POC Details
62Script para validar CVE-2020-5902 hecho en Go.https://github.com/DeepSecurity-Pe/GoF5-CVE-2020-5902POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2020-5902
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2020-5902

No comments yet


Leave a comment