Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

F5 BIG-IP Command Injection Vulnerability Let Attackers Execute Arbitrary System Commands

Posted on May 13, 2025May 13, 2025 By CWS

F5 Networks has disclosed a high-severity command injection vulnerability (CVE-2025-31644) in its BIG-IP merchandise working in Equipment mode. 

The vulnerability exists in an undisclosed iControl REST endpoint and BIG-IP TMOS Shell (tmsh) command, permitting attackers to bypass Equipment mode safety restrictions. 

Labeled as CWE-78 (Improper Neutralization of Particular Parts utilized in an OS Command), the flaw acquired a CVSS v3.1 rating of 8.7 and a CVSS v4.0 rating of 8.5, each rated as “Excessive” severity.

“This command injection vulnerability could enable an authenticated attacker to cross a safety boundary and execute arbitrary Superior Shell (bash) instructions,” F5 acknowledged in its safety advisory. 

The vulnerability impacts BIG-IP variations 17.1.0-17.1.2, 16.1.0-16.1.5, and 15.1.0-15.1.10.

Command Injection in F5 BIG-IP “save” Command

Safety researcher Matei “Mal” Badanoiu of Deloitte found that the “file” parameter of the “save” command is especially weak to command injection assaults. 

When exploited, this vulnerability permits attackers to control command syntax to execute unintended operations with elevated privileges.

A proof-of-concept exploit launched on GitHub demonstrates how attackers can craft malicious instructions utilizing shell metacharacters to separate authentic operations and inject arbitrary instructions:

This exploit terminates the save command prematurely with the }; sequence after which executes a system name through bash -c id to print the present consumer’s ID-confirming execution as root.

The vulnerability can solely be exploited by attackers who’ve legitimate administrator credentials and community entry to the affected iControl REST endpoint or native entry to the affected tmsh command.

Whereas the assault floor is restricted to authenticated customers, the potential impression stays vital because it permits privileged customers to execute instructions past their supposed authorization stage.

Profitable exploitation permits attackers to:

Execute arbitrary system instructions with root privileges.

Create or delete recordsdata by means of the BIG-IP administration port.

Entry self IP addresses.

Bypass Equipment mode safety restrictions.

Safety specialists observe that there is no such thing as a information aircraft publicity, which means the vulnerability is restricted to the management aircraft solely.

Danger FactorsDetailsAffected ProductsBIG-IP variations:17.1.0-17.1.216.1.0-16.1.515.1.0-15.1.10ImpactExecute arbitrary system instructions as rootExploit Stipulations– Legitimate administrator credentials- Entry to iControl REST API or tmsh shellCVSS 3.1 Score8.7 (Excessive)

Remediation

F5 has launched patches for affected variations: 17.1.2.2, 16.1.6, and 15.1.10.7. Organizations are strongly suggested to replace to those patched variations instantly.

For techniques that can not be instantly patched, F5 recommends implementing non permanent mitigations:

Block iControl REST entry by means of self IP addresses by altering Port Lockdown settings to “Permit None”.

Block iControl REST entry by means of the administration interface.

Limit SSH entry to trusted networks solely.

Use packet filtering to restrict entry to particular IP ranges.

“As this assault is carried out by authentic, authenticated administrator function customers, there is no such thing as a viable mitigation that additionally permits customers entry to the BIG-IP system. The one mitigation is to take away entry for customers who aren’t utterly trusted,” F5 suggested.

Organizations utilizing F5 BIG-IP ought to instantly assess their publicity and implement the required patches or mitigations to safeguard their environments towards this crucial vulnerability.

Vulnerability Assault Simulation on How Hackers Quickly Probe Web sites for Entry Factors – Free Webinar

Cyber Security News Tags:Arbitrary, Attackers, BIGIP, Command, Commands, Execute, Injection, System, Vulnerability

Post navigation

Previous Post: Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency
Next Post: CISA Warns of Flaw in TeleMessage App Used by Ex-National Security Advisor 

Related Posts

Seraphic Security Unveils BrowserTotal™ – Free AI-Powered Browser Security Assessment For Enterprises Cyber Security News
Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins Cyber Security News
New CrushFTP 0-Day Vulnerability Exploited in the Wild to Gain Access to Servers Cyber Security News
Red Hat Breach Exposes 5000+ High Profile Enterprise Customers at Risk Cyber Security News
Threat Actors Abuse AI Website Creation App to Deliver Malware Cyber Security News
Hackers Actively Attacking Cisco and Palo Alto Networks VPN Gateways to Gain Login Access Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark