Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | BIG-IP | 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, 11.6.1-11.6.5.1 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2020-5902 | https://github.com/dwisiswant0/CVE-2020-5902 | POC Details |
| 2 | Automated script for F5 BIG-IP scanner (CVE-2020-5902) using hosts retrieved from Shodan API. | https://github.com/aqhmal/CVE-2020-5902-Scanner | POC Details |
| 3 | CVE-2020-5902 BIG-IP | https://github.com/jas502n/CVE-2020-5902 | POC Details |
| 4 | POC code for checking for this vulnerability. Since the code has been released, I decided to release this one as well. Patch Immediately! | https://github.com/ar0dd/CVE-2020-5902 | POC Details |
| 5 | Proof of concept for CVE-2020-5902 | https://github.com/yassineaboukir/CVE-2020-5902 | POC Details |
| 6 | None | https://github.com/rwincey/CVE-2020-5902-NSE | POC Details |
| 7 | Proof of Concept for CVE-2020-5902 | https://github.com/un4gi/CVE-2020-5902 | POC Details |
| 8 | None | https://github.com/nsflabs/CVE-2020-5902 | POC Details |
| 9 | exploit code for F5-Big-IP (CVE-2020-5902) | https://github.com/yasserjanah/CVE-2020-5902 | POC Details |
| 10 | BIG-IP F5 Remote Code Execution | https://github.com/JSec1337/RCE-CVE-2020-5902 | POC Details |
| 11 | Python script to exploit F5 Big-IP CVE-2020-5902 | https://github.com/dunderhay/CVE-2020-5902 | POC Details |
| 12 | cve-2020-5902 POC exploit | https://github.com/r0ttenbeef/cve-2020-5902 | POC Details |
| 13 | None | https://github.com/sv3nbeast/CVE-2020-5902_RCE | POC Details |
| 14 | CVE-2020-5902 scanner | https://github.com/cybersecurityworks553/scanner-CVE-2020-5902 | POC Details |
| 15 | 批量扫描CVE-2020-5902,远程代码执行,已测试 | https://github.com/lijiaxing1997/CVE-2020-5902-POC-EXP | POC Details |
| 16 | dummy poc | https://github.com/qlkwej/poc-CVE-2020-5902 | POC Details |
| 17 | None | https://github.com/Zinkuth/F5-BIG-IP-CVE-2020-5902 | POC Details |
| 18 | Python script to check CVE-2020-5902 (F5 BIG-IP devices). | https://github.com/0xAbdullah/CVE-2020-5902 | POC Details |
| 19 | CVE-2020-5902 | https://github.com/jinnywc/CVE-2020-5902 | POC Details |
| 20 | Patch F5 appliance CVE-2020-5902 | https://github.com/GoodiesHQ/F5-Patch | POC Details |
| 21 | F5 BIG-IP Scanner (CVE-2020-5902) | https://github.com/jiansiting/CVE-2020-5902 | POC Details |
| 22 | Fix CVE-2020-5902 | https://github.com/wdlid/CVE-2020-5902-fix | POC Details |
| 23 | None | https://github.com/Any3ite/CVE-2020-5902-F5BIG | POC Details |
| 24 | None | https://github.com/k3nundrum/CVE-2020-5902 | POC Details |
| 25 | Scan from a given list for F5 BIG-IP and check for CVE-2020-5902 | https://github.com/inho28/CVE-2020-5902-F5-BIGIP | POC Details |
| 26 | F5 mass scanner and CVE-2020-5902 checker | https://github.com/cristiano-corrado/f5_scanner | POC Details |
| 27 | POC | https://github.com/ajdumanhug/CVE-2020-5902 | POC Details |
| 28 | F5 BIG-IP 任意文件读取+远程命令执行RCE | https://github.com/zhzyker/CVE-2020-5902 | POC Details |
| 29 | It is a small script to fetch out the subdomains/ip vulnerable to CVE-2020-5902 written in bash | https://github.com/GovindPalakkal/EvilRip | POC Details |
| 30 | None | https://github.com/dnerzker/CVE-2020-5902 | POC Details |
| 31 | A powershell script to check vulnerability CVE-2020-5902 of ip list | https://github.com/renanhsilva/checkvulnCVE20205902 | POC Details |
| 32 | F5 BIG IP Scanner for CVE-2020-5902 | https://github.com/halencarjunior/f5scan | POC Details |
| 33 | Script para validar CVE-2020-5902 hecho en Go. | https://github.com/deepsecurity-pe/GoF5-CVE-2020-5902 | POC Details |
| 34 | None | https://github.com/Shu1L/CVE-2020-5902-fofa-scan | POC Details |
| 35 | F5 Big-IP CVE-2020-5902 mass exploiter/fuzzer. | https://github.com/d4rk007/F5-Big-IP-CVE-2020-5902-mass-exploiter | POC Details |
| 36 | Simple Vulnerability Checker Wrote by me "@TheCyberViking" and A fellow Researcher who wanted to be left Nameless... you know who you are you beautiful bitch | https://github.com/TheCyberViking/CVE-2020-5902-Vuln-Checker | POC Details |
| 37 | Exploits for CVE-2020-5902 POC | https://github.com/itsjeffersonli/CVE-2020-5902 | POC Details |
| 38 | Checker CVE-2020-5902: BIG-IP versions 15.0.0 through 15.1.0.3, 14.1.0 through 14.1.2.5, 13.1.0 through 13.1.3.3, 12.1.0 through 12.1.5.1, and 11.6.1 through 11.6.5.1 suffer from Traffic Management User Interface (TMUI) arbitrary file read and command execution vulnerabilities. | https://github.com/MrCl0wnLab/checker-CVE-2020-5902 | POC Details |
| 39 | 批量检测CVE-2020-5902 | https://github.com/qiong-qi/CVE-2020-5902-POC | POC Details |
| 40 | F5 BIG-IP RCE CVE-2020-5902 automatic check tool | https://github.com/theLSA/f5-bigip-rce-cve-2020-5902 | POC Details |
| 41 | CVE-2020-5902 | https://github.com/Al1ex/CVE-2020-5902 | POC Details |
| 42 | None | https://github.com/freeFV/CVE-2020-5902-fofa-scan | POC Details |
| 43 | None | https://github.com/momika233/cve-2020-5902 | POC Details |
| 44 | GUI | https://github.com/rockmelodies/CVE-2020-5902-rce-gui | POC Details |
| 45 | Mass exploit for CVE-2020-5902 | https://github.com/5l1v3r1/CVE-2020-5902-Mass | POC Details |
| 46 | None | https://github.com/f5devcentral/cve-2020-5902-ioc-bigip-checker | POC Details |
| 47 | A network detection package for CVE-2020-5902, a CVE10.0 vulnerability affecting F5 Networks, Inc BIG-IP devices. | https://github.com/corelight/CVE-2020-5902-F5BigIP | POC Details |
| 48 | Automated F5 Big IP Remote Code Execution (CVE-2020-5902) Scanner Written In Python 3 | https://github.com/PushpenderIndia/CVE-2020-5902-Scanner | POC Details |
| 49 | [CVE-2020-5902] F5 BIG-IP Remote Code Execution (RCE) | https://github.com/murataydemir/CVE-2020-5902 | POC Details |
| 50 | None | https://github.com/superzerosec/cve-2020-5902 | POC Details |
| 51 | (CVE-2020-5902) BIG IP F5 TMUI RCE Vulnerability RCE PoC/ Test Script | https://github.com/ludy-dev/BIG-IP-F5-TMUI-RCE-Vulnerability | POC Details |
| 52 | simple bash script of F5 BIG-IP TMUI Vulnerability CVE-2020-5902 checker | https://github.com/faisalfs10x/F5-BIG-IP-CVE-2020-5902-shodan-scanner | POC Details |
| 53 | Auto exploit RCE CVE-2020-5902 | https://github.com/haisenberg/CVE-2020-5902 | POC Details |
| 54 | BIGIP CVE-2020-5902 Exploit POC and automation scanning vulnerability | https://github.com/z3n70/CVE-2020-5902 | POC Details |
| 55 | None | https://github.com/amitlttwo/CVE-2020-5902 | POC Details |
| 56 | Exploits for CVE-2020-5902 POC | https://github.com/flyopenair/CVE-2020-5902 | POC Details |
| 57 | A simple workflow that runs all BigIP related nuclei templates on a given target. | https://github.com/projectdiscovery/nuclei-templates/blob/main/workflows/bigip-workflow.yaml | POC Details |
| 58 | F5 BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, the Traffic Management User Interface (TMUI), also referred to as the Configuration utility, has a Remote Code Execution (RCE) vulnerability in undisclosed pages. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2020/CVE-2020-5902.yaml | POC Details |
| 59 | None | https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/F5%20BIG-IP%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2020-5902.md | POC Details |
| 60 | CVE-2020-5902 | https://github.com/B1ack4sh/Blackash-CVE-2020-5902 | POC Details |
| 61 | CVE-2020-5902 | https://github.com/Ashwesker/Blackash-CVE-2020-5902 | POC Details |
| 62 | Script para validar CVE-2020-5902 hecho en Go. | https://github.com/DeepSecurity-Pe/GoF5-CVE-2020-5902 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet