exploitdb
WORKING POC
by Carlos E. Vieira · pythonwebappshardware
https://www.exploit-db.com/exploits/48711
This exploit leverages a path traversal vulnerability in F5 Big-IP's TMUI interface to read arbitrary files, including sensitive system files like /etc/passwd and configuration files. It sends crafted HTTP requests to bypass authentication and access restricted resources.
Classification
Working Poc 95%
Target:
F5 Big-IP <= 13.1.3
No auth needed
Prerequisites:
Network access to the target's TMUI interface
exploitdb
WORKING POC
by Critical Start · bashwebappslinux
https://www.exploit-db.com/exploits/48642
This exploit leverages CVE-2020-5902, a deserialization vulnerability in F5 BIG-IP, to achieve remote code execution. It uses ysoserial to generate a malicious payload and delivers it via a crafted Java class, resulting in a reverse shell.
Classification
Working Poc 95%
Target:
F5 BIG-IP (versions affected by CVE-2020-5902)
No auth needed
Prerequisites:
Java JDK · hsqldb.jar · ysoserial · network connectivity to target
exploitdb
WORKING POC
by Budi Khoirudin · textwebappslinux
https://www.exploit-db.com/exploits/48643
This exploit leverages a path traversal vulnerability in F5 BIG-IP's TMUI interface to achieve remote command execution (RCE) and arbitrary file read. The PoC uses curl commands to bypass authentication and execute commands or read files.
Classification
Working Poc 90%
Attack Type
Rce | Info Leak
Target:
F5 BIG-IP TMUI (versions 15.0.0-15.1.0, 14.1.0-14.1.2, 13.1.0-13.1.3, 12.1.0-12.1.5, 11.6.1-11.6.5)
No auth needed
Prerequisites:
Network access to the F5 BIG-IP TMUI interface
nomisec
WORKING POC
374 stars
by jas502n · remote
https://github.com/jas502n/CVE-2020-5902
This repository contains a functional Python exploit for CVE-2020-5902, targeting F5 BIG-IP TMUI for unauthenticated remote code execution via directory traversal and command injection. The exploit chains multiple JSP endpoints to execute arbitrary commands.
Classification
Working Poc 95%
Target:
F5 BIG-IP TMUI (Traffic Management User Interface)
No auth needed
Prerequisites:
Network access to the target BIG-IP device · TMUI interface exposed to the internet
nomisec
WORKING POC
72 stars
by yassineaboukir · remote
https://github.com/yassineaboukir/CVE-2020-5902
The repository provides functional exploit URLs for CVE-2020-5902, a directory traversal and RCE vulnerability in BIG-IP's TMUI. The PoC demonstrates arbitrary file read and command execution via crafted paths in the URL.
Classification
Working Poc 90%
Target:
F5 BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, 11.6.1-11.6.5.1
No auth needed
Prerequisites:
Network access to the BIG-IP TMUI interface
nomisec
WORKING POC
62 stars
by theLSA · poc
https://github.com/theLSA/f5-bigip-rce-cve-2020-5902
This repository contains a functional exploit for CVE-2020-5902, targeting F5 BIG-IP TMUI. The exploit leverages an authentication bypass via URL parsing discrepancies in Tomcat to achieve remote code execution, file read/write, and directory listing.
Classification
Working Poc 95%
Target:
F5 BIG-IP TMUI
No auth needed
Prerequisites:
Network access to the target F5 BIG-IP device · TMUI interface exposed
nomisec
SCANNER
56 stars
by aqhmal · infoleak
https://github.com/aqhmal/CVE-2020-5902-Scanner
This repository contains a Python script that scans for CVE-2020-5902 by querying Shodan for potential F5 BIG-IP targets and attempting to exploit the vulnerability to verify its presence. It does not provide a full exploit but confirms vulnerability by checking for root-level command execution.
Classification
Scanner 100%
Target:
F5 BIG-IP (TMUI)
No auth needed
Prerequisites:
Shodan API key · Internet access · Python 3 with required libraries
nomisec
WORKING POC
43 stars
by yasserjanah · infoleak
https://github.com/yasserjanah/CVE-2020-5902
The repository contains a functional Python exploit for CVE-2020-5902, targeting F5 BIG-IP's TMUI directory traversal and RCE vulnerability. It includes both manual file read examples and an automated script for brute-forcing or reading specific files via crafted HTTP requests.
Classification
Working Poc 95%
Target:
F5 BIG-IP (versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, 11.6.1-11.6.5.1)
No auth needed
Prerequisites:
Network access to the TMUI interface · Python 3 with 'requests' library
nomisec
WORKING POC
36 stars
by dunderhay · remote
https://github.com/dunderhay/CVE-2020-5902
This repository contains a functional Python exploit for CVE-2020-5902, targeting F5 Big-IP devices. The exploit demonstrates both local file read (LFR) and remote code execution (RCE) capabilities via path traversal in the TMUI interface.
Classification
Working Poc 100%
Attack Type
Rce | Info Leak
Target:
F5 Big-IP (TMUI interface)
No auth needed
Prerequisites:
Network access to the F5 Big-IP TMUI interface · Vulnerable F5 Big-IP version (pre-patch for CVE-2020-5902)
nomisec
SCANNER
17 stars
by f5devcentral · poc
https://github.com/f5devcentral/cve-2020-5902-ioc-bigip-checker
This repository contains a Python script designed to detect Indicators of Compromise (IoCs) related to CVE-2020-5902 on F5 BIG-IP systems. It checks for signs of exploitation such as malicious users, suspicious files, and audit logs, but does not include functional exploit code.
Classification
Scanner 95%
Target:
F5 BIG-IP
No auth needed
Prerequisites:
Access to the target BIG-IP system
nomisec
WORKING POC
13 stars
by zhzyker · remote
https://github.com/zhzyker/CVE-2020-5902
This repository contains a functional Python script that exploits CVE-2020-5902, a directory traversal vulnerability in F5 BIG-IP devices, allowing arbitrary file read and potential RCE. The script constructs a malicious URL to bypass authentication and read files via the vulnerable endpoint.
Classification
Working Poc 95%
Target:
F5 BIG-IP (versions 15.x, 14.x, 13.x, 12.x, 11.x)
No auth needed
Prerequisites:
Network access to the target F5 BIG-IP management interface
nomisec
SCANNER
12 stars
by PushpenderIndia · infoleak
https://github.com/PushpenderIndia/CVE-2020-5902-Scanner
The repository contains a Python script that scans for CVE-2020-5902 by attempting to read /etc/passwd via a path traversal vulnerability in F5 BIG-IP's TMUI. It does not execute arbitrary code but confirms vulnerability by checking for the presence of 'root:x:0:0:root' in the response.
Classification
Scanner 95%
Target:
F5 BIG-IP TMUI (multiple versions)
No auth needed
Prerequisites:
List of target subdomains
nomisec
WORKING POC
12 stars
by ar0dd · poc
https://github.com/ar0dd/CVE-2020-5902
This repository contains a functional Python script that exploits CVE-2020-5902, a directory traversal vulnerability in F5 BIG-IP's TMUI interface. The script supports checking for vulnerability, reading arbitrary files, and executing commands via crafted HTTP requests.
Classification
Working Poc 95%
Target:
F5 BIG-IP TMUI (versions prior to fixed releases)
No auth needed
Prerequisites:
Network access to the target F5 BIG-IP TMUI interface
nomisec
WORKING POC
10 stars
by west9b · infoleak
https://github.com/west9b/F5-BIG-IP-POC
This repository contains a Go-based PoC for multiple F5 BIG-IP vulnerabilities, including CVE-2022-1388, which allows authentication bypass and remote command execution. The code sends crafted HTTP requests to exploit the vulnerabilities and checks for successful execution.
Classification
Working Poc 90%
Attack Type
Rce | Auth Bypass
Target:
F5 BIG-IP
No auth needed
Prerequisites:
Network access to the target F5 BIG-IP device
nomisec
WORKING POC
10 stars
by Al1ex · remote
https://github.com/Al1ex/CVE-2020-5902
This repository contains functional exploit code for CVE-2020-5902, a remote code execution vulnerability in F5 BIG-IP TMUI. The exploit leverages unauthenticated access to the TMUI interface to execute arbitrary commands via crafted HTTP requests.
Classification
Working Poc 95%
Target:
F5 BIG-IP TMUI (versions 11.6.x, 12.1.x, 13.1.x, 14.1.x, 15.0.x, 15.1.x)
No auth needed
Prerequisites:
Network access to the F5 BIG-IP TMUI interface
nomisec
WORKING POC
10 stars
by lijiaxing1997 · poc
https://github.com/lijiaxing1997/CVE-2020-5902-POC-EXP
This repository contains a functional exploit for CVE-2020-5902, a remote code execution vulnerability in F5 BIG-IP. The exploit leverages path traversal and command injection to execute arbitrary commands on vulnerable systems.
Classification
Working Poc 95%
Target:
F5 BIG-IP (versions affected by CVE-2020-5902)
No auth needed
Prerequisites:
Network access to the target F5 BIG-IP management interface
nomisec
SUSPICIOUS
9 stars
by dwisiswant0 · poc
https://github.com/dwisiswant0/CVE-2020-5902
The repository contains minimal content with a Shodan query and an image but lacks any functional exploit code or technical details about CVE-2020-5902. It appears to be a placeholder or lure rather than a legitimate PoC.
Classification
Suspicious 90%
Target:
F5 BIG-IP (implied by CVE)
No auth needed
nomisec
SUSPICIOUS
8 stars
by rockmelodies · poc
https://github.com/rockmelodies/CVE-2020-5902-rce-gui
The repository claims to be a GUI tool for exploiting CVE-2020-5902 but contains no actual exploit code. Instead, it provides screenshots and a Baidu cloud download link, which is a common tactic for luring users into downloading potentially malicious files.
Classification
Suspicious 90%
Target:
F5 BIG-IP TMUI
No auth needed
nomisec
WORKING POC
8 stars
by sv3nbeast · remote
https://github.com/sv3nbeast/CVE-2020-5902_RCE
This repository contains a functional Python exploit for CVE-2020-5902, a remote code execution vulnerability in F5 BIG-IP. The exploit leverages path traversal and command alias manipulation to execute arbitrary commands on the target system.
Classification
Working Poc 95%
Target:
F5 BIG-IP (TMUI)
No auth needed
Prerequisites:
Network access to the target BIG-IP management interface
nomisec
SCANNER
8 stars
by nsflabs · remote
https://github.com/nsflabs/CVE-2020-5902
This repository contains a Python script that scans for CVE-2020-5902, a remote code execution vulnerability in F5 BIG-IP TMUI. The script checks if a target system is vulnerable by attempting to read /etc/passwd via a path traversal attack.
Classification
Scanner 95%
Target:
F5 BIG-IP TMUI (Traffic Management User Interface)
No auth needed
Prerequisites:
Network access to the BIG-IP management port or Self IPs
nomisec
SCANNER
6 stars
by GovindPalakkal · poc
https://github.com/GovindPalakkal/EvilRip
This repository contains a bash script that scans for CVE-2020-5902 by checking if the target BIG-IP TMUI interface is vulnerable to an unauthenticated file read vulnerability. It does not exploit the vulnerability but detects it by attempting to read /etc/passwd.
Classification
Scanner 95%
Target:
F5 BIG-IP TMUI (versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, 11.6.1-11.6.5.1)
No auth needed
Prerequisites:
List of target domains/IPs in a text file · httprobe installed for domain filtering
nomisec
SCANNER
5 stars
by MrCl0wnLab · remote
https://github.com/MrCl0wnLab/checker-CVE-2020-5902
This repository contains a Python script that scans for CVE-2020-5902, a vulnerability in F5 BIG-IP TMUI allowing arbitrary file read and command execution. The script checks multiple endpoints to detect vulnerable systems but does not include exploit code for actual command execution.
Classification
Scanner 95%
Target:
F5 BIG-IP TMUI versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, 11.6.1-11.6.5.1
No auth needed
Prerequisites:
Network access to the target BIG-IP TMUI interface
nomisec
SCANNER
4 stars
by corelight · poc
https://github.com/corelight/CVE-2020-5902-F5BigIP
This repository provides a Zeek detection package for identifying exploit attempts and successful exploits of CVE-2020-5902, a critical vulnerability in F5 BIG-IP devices. It includes scripts to monitor HTTP traffic for specific patterns associated with the exploit.
Classification
Scanner 95%
Target:
F5 BIG-IP devices
No auth needed
Prerequisites:
Network access to the target F5 BIG-IP device · Zeek installed and configured
nomisec
WORKING POC
4 stars
by d4rk007 · poc
https://github.com/d4rk007/F5-Big-IP-CVE-2020-5902-mass-exploiter
This repository contains a functional Python script that exploits CVE-2020-5902, a directory traversal vulnerability in F5 Big-IP's TMUI interface, to read arbitrary files (e.g., /etc/passwd). The script is designed for mass exploitation using asynchronous HTTP requests.
Classification
Working Poc 95%
Target:
F5 Big-IP TMUI (versions 11.6.x, 12.1.x, 13.1.x, 14.1.x, 15.0.x, 15.1.x)
No auth needed
Prerequisites:
List of target URLs · Network access to vulnerable F5 Big-IP instances
nomisec
SCANNER
4 stars
by jiansiting · poc
https://github.com/jiansiting/CVE-2020-5902
This repository contains a Python script that scans for CVE-2020-5902, a vulnerability in F5 BIG-IP devices. The script checks for the presence of the vulnerability by sending a crafted HTTP request and verifying the response, but it does not include exploit code for achieving remote code execution.
Classification
Scanner 95%
Target:
F5 BIG-IP (TMUI)
No auth needed
Prerequisites:
Network access to the target F5 BIG-IP device
nomisec
SUSPICIOUS
3 stars
by 34zY · poc
https://github.com/34zY/APT-Backpack
The repository lists multiple CVEs and tools but contains no actual exploit code or technical details. It appears to be a collection of references without functional PoCs, likely serving as a lure for further engagement.
Classification
Suspicious 90%
Target:
multiple (see CVE list)
No auth needed
Prerequisites:
none provided
nomisec
WORKING POC
3 stars
by r0ttenbeef · poc
https://github.com/r0ttenbeef/cve-2020-5902
This repository contains a functional Python exploit for CVE-2020-5902, a directory traversal vulnerability in F5 BIG-IP's TMUI interface. The exploit allows unauthenticated attackers to read arbitrary files from the system, including sensitive files like /etc/passwd and /etc/hosts.
Classification
Working Poc 95%
Target:
F5 BIG-IP TMUI (Traffic Management User Interface)
No auth needed
Prerequisites:
Network access to the F5 BIG-IP TMUI interface
nomisec
SCANNER
2 stars
by z3n70 · infoleak
https://github.com/z3n70/CVE-2020-5902
The repository contains a Ruby script that scans for CVE-2020-5902 by attempting to read /etc/passwd via a path traversal vulnerability in F5 BIG-IP's TMUI interface. It checks for specific strings in the response to determine vulnerability but does not include exploit code for RCE.
Classification
Scanner 90%
Target:
F5 BIG-IP TMUI (versions 11.6.x, 12.1.x, 13.1.x, 14.1.x, 15.0.x, 15.1.x)
No auth needed
Prerequisites:
Network access to the target BIG-IP TMUI interface · List of target URLs in a text file
nomisec
SCANNER
2 stars
by faisalfs10x · infoleak
https://github.com/faisalfs10x/F5-BIG-IP-CVE-2020-5902-shodan-scanner
This repository contains a bash script that uses Shodan CLI to identify F5 BIG-IP systems potentially vulnerable to CVE-2020-5902 by checking for a specific file read vulnerability. It does not exploit the vulnerability but scans for it.
Classification
Scanner 95%
Target:
F5 BIG-IP
No auth needed
Prerequisites:
Shodan CLI installed and configured
nomisec
WORKING POC
2 stars
by murataydemir · remote
https://github.com/murataydemir/CVE-2020-5902
The repository provides functional exploit URLs for CVE-2020-5902, demonstrating unauthenticated RCE in F5 BIG-IP TMUI via directory traversal and command injection. The URLs target specific endpoints to execute commands, read files, and list directories.
Classification
Working Poc 90%
Target:
F5 BIG-IP TMUI (versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, 11.6.1-11.6.5.1)
No auth needed
Prerequisites:
Network access to the BIG-IP management port or self IPs
nomisec
WORKING POC
2 stars
by qiong-qi · poc
https://github.com/qiong-qi/CVE-2020-5902-POC
This repository contains a functional Python script that exploits CVE-2020-5902, a directory traversal vulnerability in F5 BIG-IP's TMUI interface, to read arbitrary files (e.g., /etc/passwd). The script includes multi-threading for batch scanning and checks for successful exploitation via JSON response parsing or pattern matching.
Classification
Working Poc 95%
Target:
F5 BIG-IP TMUI (versions 11.6.x, 12.1.x, 13.1.x, 14.1.x, 15.0.x, 15.1.x)
No auth needed
Prerequisites:
Network access to the F5 BIG-IP TMUI interface · Python 3.7 environment
nomisec
SCANNER
2 stars
by DeepSecurity-Pe · poc
https://github.com/DeepSecurity-Pe/GoF5-CVE-2020-5902
This repository contains a Go-based scanner for CVE-2020-5902, which checks if a target F5 BIG-IP system is vulnerable by attempting to read /etc/passwd via a path traversal flaw in the TMUI interface. It does not exploit the vulnerability beyond detection.
Classification
Scanner 95%
Target:
F5 BIG-IP Traffic Management User Interface (TMUI)
No auth needed
Prerequisites:
Network access to the target F5 BIG-IP system
nomisec
SCANNER
2 stars
by cybersecurityworks553 · remote
https://github.com/cybersecurityworks553/scanner-CVE-2020-5902
The repository contains a Python script that scans for CVE-2020-5902 by attempting to read /etc/passwd via a path traversal vulnerability in F5 BIG-IP TMUI. It checks for a 200 status code and non-empty JSON response to determine vulnerability.
Classification
Scanner 95%
Target:
F5 BIG-IP TMUI (versions affected by CVE-2020-5902)
No auth needed
Prerequisites:
List of target IP addresses in 'ip.txt' · Network access to target systems on port 443
nomisec
WORKING POC
1 stars
by amitlttwo · remote
https://github.com/amitlttwo/CVE-2020-5902
This repository contains a functional exploit for CVE-2020-5902, targeting a directory traversal vulnerability in F5 BIG-IP's TMUI. The exploit allows unauthenticated remote file read access via crafted HTTP requests to undisclosed endpoints.
Classification
Working Poc 95%
Target:
F5 BIG-IP (versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, 11.6.1-11.6.5.1)
No auth needed
Prerequisites:
Network access to the target BIG-IP TMUI interface
nomisec
WORKING POC
1 stars
by haisenberg · infoleak
https://github.com/haisenberg/CVE-2020-5902
The repository contains a functional exploit script for CVE-2020-5902, targeting F5 BIG-IP devices. The exploit leverages a path traversal vulnerability in the TMUI interface to achieve RCE and file read operations without authentication.
Classification
Working Poc 95%
Target:
F5 BIG-IP TMUI (versions prior to fixed releases)
No auth needed
Prerequisites:
Target must be a vulnerable F5 BIG-IP device with exposed TMUI interface
nomisec
WORKING POC
1 stars
by halencarjunior · poc
https://github.com/halencarjunior/f5scan
This repository contains a functional Python script that scans for and exploits CVE-2020-5902, a vulnerability in F5 BIG-IP devices. The script can detect vulnerable hosts, perform LFI (Local File Inclusion), and execute commands via the vulnerable endpoint.
Classification
Working Poc 95%
Target:
F5 BIG-IP
No auth needed
Prerequisites:
Python 3+ · Shodan API key (for Shodan search functionality) · Network access to target F5 BIG-IP device
nomisec
SCANNER
1 stars
by Shu1L · poc
https://github.com/Shu1L/CVE-2020-5902-fofa-scan
This repository contains a Python script that scans for F5 BIG-IP systems vulnerable to CVE-2020-5902 using the FOFA search engine. It checks for the presence of the vulnerability by attempting to read /etc/passwd via the exposed endpoint.
Classification
Scanner 90%
Target:
F5 BIG-IP
No auth needed
Prerequisites:
FOFA API key · FOFA membership
nomisec
SCANNER
1 stars
by renanhsilva · poc
https://github.com/renanhsilva/checkvulnCVE20205902
The repository contains a PowerShell script that checks for CVE-2020-5902 by attempting to read /etc/passwd via a path traversal vulnerability in F5 BIG-IP's TMUI interface. It iterates over a list of IPs and reports vulnerable targets.
Classification
Scanner 95%
Target:
F5 BIG-IP TMUI (Traffic Management User Interface)
No auth needed
Prerequisites:
List of target IPs · Network access to F5 BIG-IP TMUI interface
nomisec
WORKING POC
1 stars
by 0xAbdullah · remote
https://github.com/0xAbdullah/CVE-2020-5902
This repository contains a functional Python script that exploits CVE-2020-5902, a vulnerability in F5 BIG-IP devices. The script checks for vulnerability by reading sensitive files and executes arbitrary commands via a multi-step process involving CLI alias creation and file manipulation.
Classification
Working Poc 100%
Target:
F5 BIG-IP devices
No auth needed
Prerequisites:
Network access to the target F5 BIG-IP device
nomisec
WORKING POC
1 stars
by jinnywc · poc
https://github.com/jinnywc/CVE-2020-5902
This Python script exploits CVE-2020-5902, a directory traversal and command execution vulnerability in F5 BIG-IP TMUI. It sends crafted HTTP requests to read sensitive files and execute commands without authentication.
Classification
Working Poc 90%
Target:
F5 BIG-IP TMUI (versions 11.6.x, 12.1.x, 13.1.x, 14.1.x, 15.0.x, 15.1.x)
No auth needed
Prerequisites:
Network access to the target BIG-IP TMUI interface
nomisec
WORKING POC
1 stars
by Zinkuth · poc
https://github.com/Zinkuth/F5-BIG-IP-CVE-2020-5902
The repository provides functional exploit code for CVE-2020-5902, a critical vulnerability in F5 BIG-IP TMUI. It includes multiple proof-of-concept URLs for local file inclusion and remote code execution, along with detection methods using tools like Nuclei and Nmap.
Classification
Working Poc 95%
Target:
F5 BIG-IP TMUI (versions affected by CVE-2020-5902)
No auth needed
Prerequisites:
Network access to the vulnerable F5 BIG-IP TMUI interface
nomisec
SCANNER
1 stars
by qlkwej · poc
https://github.com/qlkwej/poc-CVE-2020-5902
The repository contains a Python script that scans for CVE-2020-5902 by checking if a target BIG-IP device exposes sensitive files via a path traversal vulnerability. It does not exploit the vulnerability but detects its presence.
Classification
Scanner 90%
Target:
F5 BIG-IP (TMUI)
No auth needed
Prerequisites:
Network access to the target BIG-IP device · HTTPS access to the TMUI interface
nomisec
WORKING POC
1 stars
by JSec1337 · poc
https://github.com/JSec1337/RCE-CVE-2020-5902
The repository provides functional exploit URLs for CVE-2020-5902, a critical RCE vulnerability in F5 BIG-IP devices. It includes paths for file reads and command execution via directory traversal in the TMUI interface.
Classification
Working Poc 90%
Target:
F5 BIG-IP (versions 15.0.0-15.1.0.3, 14.*.*, 13.*.*, 12.*.*, 11.*.*)
No auth needed
Prerequisites:
Network access to vulnerable BIG-IP TMUI interface
nomisec
WORKING POC
by 0xBlackash · poc
https://github.com/0xBlackash/CVE-2020-5902
The repository contains a functional Python exploit for CVE-2020-5902, an unauthenticated RCE vulnerability in F5 BIG-IP TMUI. It includes both file read and command execution capabilities via crafted HTTP requests to vulnerable endpoints.
Classification
Working Poc 95%
Target:
F5 BIG-IP TMUI (Traffic Management User Interface)
No auth needed
Prerequisites:
Network access to the BIG-IP management interface
nomisec
WORKING POC
by zaryouhashraf · poc
https://github.com/zaryouhashraf/CVE-2020-5902
The repository contains a functional Python exploit for CVE-2020-5902, demonstrating unauthenticated remote code execution (RCE) and arbitrary file read capabilities in F5 BIG-IP TMUI via directory traversal and command injection.
Classification
Working Poc 100%
Target:
F5 BIG-IP TMUI (versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, 11.6.1-11.6.5.1)
No auth needed
Prerequisites:
Network access to the TMUI interface (typically port 443 or 8443)
gitlab
WORKING POC
by yingweizhao · remote
https://gitlab.com/yingweizhao/CVE-2020-5902
This repository contains a functional Python exploit for CVE-2020-5902, a critical unauthenticated RCE vulnerability in F5 BIG-IP TMUI. The exploit chains multiple JSP endpoints to execute arbitrary commands via a crafted CLI alias.
Classification
Working Poc 95%
Target:
F5 BIG-IP TMUI (versions 11.6.x-15.1.x)
No auth needed
Prerequisites:
Network access to the BIG-IP management interface
nomisec
SCANNER
by cristiano-corrado · poc
https://github.com/cristiano-corrado/f5_scanner
This repository contains a Python-based scanner for detecting F5 BIG-IP devices vulnerable to CVE-2020-5902. It checks for the presence of F5-specific keywords and attempts to exploit the vulnerability by sending a crafted request to the TMSH command endpoint.
Classification
Scanner 95%
Target:
F5 BIG-IP TMUI (Traffic Management User Interface)
No auth needed
Prerequisites:
Network access to the target F5 BIG-IP device · Target device must be running a vulnerable version of TMUI
nomisec
SCANNER
by ludy-dev · remote
https://github.com/ludy-dev/BIG-IP-F5-TMUI-RCE-Vulnerability
The repository contains a Python script that scans for CVE-2020-5902 by checking specific endpoints on F5 BIG-IP TMUI for vulnerability indicators. It does not include exploit code for achieving RCE but verifies the presence of the vulnerability through pattern matching.
Classification
Scanner 90%
Target:
F5 BIG-IP TMUI (Traffic Management User Interface)
No auth needed
Prerequisites:
Network access to the target F5 BIG-IP device
nomisec
WORKING POC
by superzerosec · remote
https://github.com/superzerosec/cve-2020-5902
This repository contains a functional Python exploit for CVE-2020-5902, a remote code execution vulnerability in F5 BIG-IP. The exploit leverages directory traversal and command injection to execute arbitrary commands on the target system.
Classification
Working Poc 95%
Target:
F5 BIG-IP
No auth needed
Prerequisites:
Network access to the target system · Target system running vulnerable F5 BIG-IP software
nomisec
SCANNER
by TheCyberViking · poc
https://github.com/TheCyberViking/CVE-2020-5902-Vuln-Checker
The repository contains a Python script that checks for the presence of CVE-2020-5902 by sending a GET request to the F5 BIG-IP login page. It does not exploit the vulnerability but scans for its presence by verifying the HTTP response status code.
Classification
Scanner 90%
Target:
F5 BIG-IP (versions 5.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, 11.6.1-11.6.5.1)
No auth needed
Prerequisites:
Network access to the target F5 BIG-IP device
nomisec
WORKING POC
by dnerzker · poc
https://github.com/dnerzker/CVE-2020-5902
The repository provides functional exploit URLs for CVE-2020-5902, a directory traversal and RCE vulnerability in BIG-IP's TMUI. The PoC includes paths to read sensitive files and execute commands via unauthenticated HTTP requests.
Classification
Working Poc 95%
Target:
F5 BIG-IP (versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, 11.6.1-11.6.5.1)
No auth needed
Prerequisites:
Network access to the BIG-IP TMUI interface
nomisec
SCANNER
by momika233 · poc
https://github.com/momika233/cve-2020-5902
This repository references an NMAP script for detecting CVE-2020-5902, a remote code execution vulnerability in F5 BIG-IP TMUI. It does not contain exploit code but points to an external NMAP script for vulnerability scanning.
Classification
Scanner 90%
Target:
F5 BIG-IP TMUI (Traffic Management User Interface)
No auth needed
Prerequisites:
Network access to the target F5 BIG-IP device · NMAP installed with the referenced script
nomisec
WORKING POC
by flyopenair · poc
https://github.com/flyopenair/CVE-2020-5902
This repository contains functional exploit code for CVE-2020-5902, a directory traversal and RCE vulnerability in F5 BIG-IP TMUI. It includes a bash script for testing RCE/LFI and a Metasploit module for full exploitation.
Classification
Working Poc 95%
Target:
F5 BIG-IP TMUI (versions 11.6.1-11.6.5, 12.1.0-12.1.5, 13.1.0-13.1.3, 14.1.0-14.1.2, 15.0.0, 15.1.0)
No auth needed
Prerequisites:
Network access to F5 BIG-IP TMUI interface · SSL/TLS connectivity to port 443
nomisec
SCANNER
by freeFV · poc
https://github.com/freeFV/CVE-2020-5902-fofa-scan
This repository contains a Python script that scans for F5 BIG-IP systems vulnerable to CVE-2020-5902 using FOFA (a search engine for network assets). It checks for the presence of the vulnerability by attempting to read /etc/passwd via the exposed TMUI endpoint.
Classification
Scanner 90%
Target:
F5 BIG-IP (TMUI interface)
No auth needed
Prerequisites:
FOFA API key · FOFA membership
nomisec
WORKING POC
by ajdumanhug · poc
https://github.com/ajdumanhug/CVE-2020-5902
This repository contains a functional Python exploit for CVE-2020-5902, targeting F5 BIG-IP devices. The exploit demonstrates both Local File Inclusion (LFI) and Remote Code Execution (RCE) via directory traversal and command injection through the TMUI interface.
Classification
Working Poc 95%
Target:
F5 BIG-IP (TMUI interface)
No auth needed
Prerequisites:
Network access to the target F5 BIG-IP device · TMUI interface exposed to the attacker
nomisec
WORKING POC
by k3nundrum · poc
https://github.com/k3nundrum/CVE-2020-5902
This Python script exploits CVE-2020-5902, a directory traversal and RCE vulnerability in F5 BIG-IP TMUI. It allows unauthenticated attackers to execute commands, read files, or check for vulnerability via crafted HTTP requests.
Classification
Working Poc 95%
Target:
F5 BIG-IP TMUI (versions 11.6.x, 12.1.x, 13.1.x, 14.1.x, 15.0.x, 15.1.x)
No auth needed
Prerequisites:
Network access to the target F5 BIG-IP TMUI interface
nomisec
SCANNER
by inho28 · poc
https://github.com/inho28/CVE-2020-5902-F5-BIGIP
This repository contains a Python script that scans for F5 BIG-IP servers and checks for CVE-2020-5902 by attempting to read /etc/profile via a path traversal vulnerability. It does not exploit the vulnerability beyond detection.
Classification
Scanner 95%
Target:
F5 BIG-IP (versions affected by CVE-2020-5902)
No auth needed
Prerequisites:
List of target domains/URLs
nomisec
WORKING POC
by Any3ite · poc
https://github.com/Any3ite/CVE-2020-5902-F5BIG
This repository contains a functional Go-based exploit for CVE-2020-5902, targeting F5 BIG-IP devices. The exploit leverages a path traversal vulnerability to read arbitrary files or execute commands via unauthenticated access to the TMUI interface.
Classification
Working Poc 95%
Attack Type
Rce | Info Leak
Target:
F5 BIG-IP (TMUI interface)
No auth needed
Prerequisites:
Network access to the F5 BIG-IP management interface (typically port 443)
vulncheck_xdb
WORKING POC
remote
https://github.com/freeFV/CVE-2020-6308-mass-exploiter
This repository contains a functional mass exploiter for CVE-2020-5902, targeting F5 Big-IP devices. The exploit leverages a path traversal vulnerability to read sensitive files like /etc/passwd, confirming vulnerability status.
Classification
Working Poc 95%
Target:
F5 Big-IP (TMUI)
No auth needed
Prerequisites:
list of target IPs/URLs
metasploit
WORKING POC
NORMAL
by Mikhail Klyuchnikov, wvu · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/f5_bigip_tmui_rce_cve_2020_5902.rb
This Metasploit module exploits a directory traversal vulnerability (CVE-2020-5902) in F5 BIG-IP TMUI to upload and execute a shell script as root. It leverages a command alias escape in the Traffic Management Shell (TMSH) to achieve remote code execution.
Classification
Working Poc 100%
Target:
F5 BIG-IP TMUI versions 11.6.1-11.6.5, 12.1.0-12.1.5, 13.1.0-13.1.3, 14.1.0-14.1.2, 15.0.0, and 15.1.0
No auth needed
Prerequisites:
Network access to the F5 BIG-IP TMUI interface (typically port 443)