Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

F5 BIG-IP Command Injection Vulnerability Let Attackers Execute Arbitrary System Commands

Posted on May 13, 2025May 13, 2025 By CWS

F5 Networks has disclosed a high-severity command injection vulnerability (CVE-2025-31644) in its BIG-IP merchandise working in Equipment mode. 

The vulnerability exists in an undisclosed iControl REST endpoint and BIG-IP TMOS Shell (tmsh) command, permitting attackers to bypass Equipment mode safety restrictions. 

Labeled as CWE-78 (Improper Neutralization of Particular Parts utilized in an OS Command), the flaw acquired a CVSS v3.1 rating of 8.7 and a CVSS v4.0 rating of 8.5, each rated as “Excessive” severity.

“This command injection vulnerability could enable an authenticated attacker to cross a safety boundary and execute arbitrary Superior Shell (bash) instructions,” F5 acknowledged in its safety advisory. 

The vulnerability impacts BIG-IP variations 17.1.0-17.1.2, 16.1.0-16.1.5, and 15.1.0-15.1.10.

Command Injection in F5 BIG-IP “save” Command

Safety researcher Matei “Mal” Badanoiu of Deloitte found that the “file” parameter of the “save” command is especially weak to command injection assaults. 

When exploited, this vulnerability permits attackers to control command syntax to execute unintended operations with elevated privileges.

A proof-of-concept exploit launched on GitHub demonstrates how attackers can craft malicious instructions utilizing shell metacharacters to separate authentic operations and inject arbitrary instructions:

This exploit terminates the save command prematurely with the }; sequence after which executes a system name through bash -c id to print the present consumer’s ID-confirming execution as root.

The vulnerability can solely be exploited by attackers who’ve legitimate administrator credentials and community entry to the affected iControl REST endpoint or native entry to the affected tmsh command.

Whereas the assault floor is restricted to authenticated customers, the potential impression stays vital because it permits privileged customers to execute instructions past their supposed authorization stage.

Profitable exploitation permits attackers to:

Execute arbitrary system instructions with root privileges.

Create or delete recordsdata by means of the BIG-IP administration port.

Entry self IP addresses.

Bypass Equipment mode safety restrictions.

Safety specialists observe that there is no such thing as a information aircraft publicity, which means the vulnerability is restricted to the management aircraft solely.

Danger FactorsDetailsAffected ProductsBIG-IP variations:17.1.0-17.1.216.1.0-16.1.515.1.0-15.1.10ImpactExecute arbitrary system instructions as rootExploit Stipulations– Legitimate administrator credentials- Entry to iControl REST API or tmsh shellCVSS 3.1 Score8.7 (Excessive)

Remediation

F5 has launched patches for affected variations: 17.1.2.2, 16.1.6, and 15.1.10.7. Organizations are strongly suggested to replace to those patched variations instantly.

For techniques that can not be instantly patched, F5 recommends implementing non permanent mitigations:

Block iControl REST entry by means of self IP addresses by altering Port Lockdown settings to “Permit None”.

Block iControl REST entry by means of the administration interface.

Limit SSH entry to trusted networks solely.

Use packet filtering to restrict entry to particular IP ranges.

“As this assault is carried out by authentic, authenticated administrator function customers, there is no such thing as a viable mitigation that additionally permits customers entry to the BIG-IP system. The one mitigation is to take away entry for customers who aren’t utterly trusted,” F5 suggested.

Organizations utilizing F5 BIG-IP ought to instantly assess their publicity and implement the required patches or mitigations to safeguard their environments towards this crucial vulnerability.

Vulnerability Assault Simulation on How Hackers Quickly Probe Web sites for Entry Factors – Free Webinar

Cyber Security News Tags:Arbitrary, Attackers, BIGIP, Command, Commands, Execute, Injection, System, Vulnerability

Post navigation

Previous Post: Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency
Next Post: CISA Warns of Flaw in TeleMessage App Used by Ex-National Security Advisor 

Related Posts

Adobe Photoshop Vulnerability Let Attackers Execute Arbitrary Code Cyber Security News
Hackers Drop Info-Stealing Malware On TikTok Users Device Using AI-Generated Videos Cyber Security News
50,000+ Azure AD Users Access Token Exposed From Unauthenticated API Endpoint Cyber Security News
Securing Remote Endpoints in Distributed Enterprise Systems Cyber Security News
Achieving Data Privacy Regulation Compliance in 2025 Frameworks Cyber Security News
Google Cloud and Cloudflare Suffers Massive Widespread Outages Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks
  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks
  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News