CVE-2020-5902
CRITICAL KEV RANSOMWARE NUCLEIBIG-IP <15.2 - RCE
Title source: llmDescription
In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, the Traffic Management User Interface (TMUI), also referred to as the Configuration utility, has a Remote Code Execution (RCE) vulnerability in undisclosed pages.
Exploits (64)
nomisec
WORKING POC
72 stars
by yassineaboukir · remote
https://github.com/yassineaboukir/CVE-2020-5902
nomisec
SCANNER
17 stars
by f5devcentral · poc
https://github.com/f5devcentral/cve-2020-5902-ioc-bigip-checker
nomisec
SCANNER
12 stars
by PushpenderIndia · infoleak
https://github.com/PushpenderIndia/CVE-2020-5902-Scanner
nomisec
WORKING POC
10 stars
by lijiaxing1997 · poc
https://github.com/lijiaxing1997/CVE-2020-5902-POC-EXP
nomisec
SUSPICIOUS
8 stars
by rockmelodies · poc
https://github.com/rockmelodies/CVE-2020-5902-rce-gui
nomisec
WORKING POC
4 stars
by d4rk007 · poc
https://github.com/d4rk007/F5-Big-IP-CVE-2020-5902-mass-exploiter
nomisec
SCANNER
2 stars
by DeepSecurity-Pe · poc
https://github.com/DeepSecurity-Pe/GoF5-CVE-2020-5902
nomisec
SCANNER
2 stars
by cybersecurityworks553 · remote
https://github.com/cybersecurityworks553/scanner-CVE-2020-5902
nomisec
SCANNER
2 stars
by faisalfs10x · infoleak
https://github.com/faisalfs10x/F5-BIG-IP-CVE-2020-5902-shodan-scanner
nomisec
SCANNER
by TheCyberViking · poc
https://github.com/TheCyberViking/CVE-2020-5902-Vuln-Checker
exploitdb
WORKING POC
by Critical Start · bashwebappslinux
https://www.exploit-db.com/exploits/48642
exploitdb
WORKING POC
by Budi Khoirudin · textwebappslinux
https://www.exploit-db.com/exploits/48643
metasploit
WORKING POC
NORMAL
by Mikhail Klyuchnikov, wvu · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/f5_bigip_tmui_rce_cve_2020_5902.rb
exploitdb
WORKING POC
by Carlos E. Vieira · pythonwebappshardware
https://www.exploit-db.com/exploits/48711
Nuclei Templates (1)
F5 BIG-IP TMUI - Remote Code Execution
CRITICALby madrobot,dwisiswant0,ringo
Shodan:
http.title:"big-ip®-+redirect" +"server"
FOFA:
title="big-ip®-+redirect" +"server"
References (13)
Scores
CVSS v3
9.8
EPSS
0.9443
EPSS Percentile
100.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitation Intel
CISA KEV
2021-11-03
VulnCheck KEV
2020-07-22
InTheWild.io
2021-07-23
ENISA EUVD
EUVD-2020-27056
Ransomware Use
Confirmed
Classification
CWE
CWE-22
Status
published
Affected Products (14)
f5/big-ip_access_policy_manager
< 11.6.5.2
f5/big-ip_advanced_firewall_manager
< 11.6.5.2
f5/big-ip_advanced_web_application_firewall
< 11.6.5.2
f5/big-ip_analytics
< 11.6.5.2
f5/big-ip_application_acceleration_manager
< 11.6.5.2
f5/big-ip_application_security_manager
< 11.6.5.2
f5/big-ip_ddos_hybrid_defender
< 11.6.5.2
f5/big-ip_domain_name_system
< 11.6.5.2
f5/big-ip_fraud_protection_service
< 11.6.5.2
f5/big-ip_global_traffic_manager
< 11.6.5.2
f5/big-ip_link_controller
< 11.6.5.2
f5/big-ip_local_traffic_manager
< 11.6.5.2
f5/big-ip_policy_enforcement_manager
< 11.6.5.2
f5/ssl_orchestrator
< 11.6.5.2
Timeline
Published
Jul 01, 2020
KEV Added
Nov 03, 2021
Tracked Since
Feb 18, 2026