Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2023-46747 (F5 BIG-IP) RCE | https://github.com/bijaysenihang/CVE-2023-46747-Mass-RCE | POC Details |
| 2 | exploit for f5-big-ip RCE cve-2023-46747 | https://github.com/W01fh4cker/CVE-2023-46747-RCE | POC Details |
| 3 | CVE-2023-46747 Criticle Auth Bypass | https://github.com/fu2x2000/CVE-2023-46747 | POC Details |
| 4 | None | https://github.com/maniak-academy/Mitigate-CVE-2023-46747 | POC Details |
| 5 | None | https://github.com/y4v4z/CVE-2023-46747-POC | POC Details |
| 6 | None | https://github.com/nvansluis/test_cve-2023-46747 | POC Details |
| 7 | An Exploitation script developed to exploit the CVE-2023-46747 which Pre Auth Remote Code Execution of f5-BIG Ip producs | https://github.com/sanjai-AK47/CVE-2023-46747 | POC Details |
| 8 | None | https://github.com/vidura2/cve-2023-46747 | POC Details |
| 9 | exploit for f5-big-ip RCE cve-2023-46747 | https://github.com/rainbowhatrkn/CVE-2023-46747-RCE | POC Details |
| 10 | An Exploitation script developed to exploit the CVE-2023-46747 which Pre Auth Remote Code Execution of f5-BIG Ip producs | https://github.com/RevoltSecurities/CVE-2023-46747 | POC Details |
| 11 | CVE-2023-46747-Mass-RCE | https://github.com/Rizzler4562/CVE-2023-46747-Mass-RCE | POC Details |
| 12 | CVE-2023-46747-Mass-RCE | https://github.com/Xanexs/CVE-2023-46747-Mass-RCE | POC Details |
| 13 | CVE-2023-46747-Mass-RCE | https://github.com/AMELYA13/CVE-2023-46747-Mass-RCE | POC Details |
| 14 | CVE-2023-46747-Mass-RCE | https://github.com/MacTavish2/CVE-2023-46747-Mass-RCE | POC Details |
| 15 | None | https://github.com/zgimszhd61/CVE-2023-46747-RCE-poc | POC Details |
| 16 | CVE-2023-46747 is a critical severity authentication bypass vulnerability in F5 BIG-IP that could allow an unauthenticated attacker to achieve remote code execution (RCE). The vulnerability impacts the BIG-IP Configuration utility, also known as the TMUI, wherein arbitrary requests can bypass authentication. The vulnerability received a CVSSv3 score of 9.8. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-46747.yaml | POC Details |
| 17 | CVE-2023-46747-RCE PoC | https://github.com/cediegreyhat/BigFinger | POC Details |
| 18 | # F5 BIG-IP CVE-2023-46747 – Unauth RCE + Auto Reverse Shell Modified & improved Nuclei template by raguraman ✓ Creates hidden admin ✓ Instant TCP revshell (just edit LHOST/LPORT) ✓ Works on all unpatched 13.x-17.x ⚠️ Authorized pentesting ONLY! Patch: K000137353 | https://github.com/Razzlemouse/F5-BIG-IP-CVE-2023-46747---Unauthenticated-RCE-Reverse-Shell-Nuclei-Template-Modified- | POC Details |
| 19 | # F5 BIG-IP CVE-2023-46747 – Unauth RCE + Auto Reverse Shell Modified Nuclei template by raguraman ✓ Creates hidden admin ✓ Instant TCP revshell (just edit LHOST/LPORT) ✓ Works on all unpatched 13.x-17.x ⚠️ Authorized pentesting ONLY! Patch: K000137353 | https://github.com/Razzlemouse/F5-BIG-IP-SmuggleShell-CVE-2023-46747-Exploit | POC Details |
No public POC found.
Login to generate AI POCNo comments yet