Логотип exploitDog
bind:CVE-2025-31644
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-31644

Количество 3

Количество 3

nvd логотип

CVE-2025-31644

9 месяцев назад

When running in Appliance mode, a command injection vulnerability exists in an undisclosed iControl REST and BIG-IP TMOS Shell (tmsh) command which may allow an authenticated attacker with administrator role privileges to execute arbitrary system commands. A successful exploit can allow the attacker to cross a security boundary.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS3: 8.7
EPSS: Низкий
github логотип

GHSA-2mq5-vgx2-cq4h

9 месяцев назад

When running in Appliance mode, a command injection vulnerability exists in an undisclosed iControl REST and BIG-IP TMOS Shell (tmsh) command which may allow an authenticated attacker with administrator role privileges to execute arbitrary system commands. A successful exploit can allow the attacker to cross a security boundary.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS3: 8.7
EPSS: Низкий
fstec логотип

BDU:2025-10364

9 месяцев назад

Уязвимость компонента iControl REST Handler средства контроля доступа и удаленной аутентификации BIG-IP, позволяющая нарушителю выполнить произвольные команды

CVSS3: 8.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-31644

When running in Appliance mode, a command injection vulnerability exists in an undisclosed iControl REST and BIG-IP TMOS Shell (tmsh) command which may allow an authenticated attacker with administrator role privileges to execute arbitrary system commands. A successful exploit can allow the attacker to cross a security boundary.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS3: 8.7
0%
Низкий
9 месяцев назад
github логотип
GHSA-2mq5-vgx2-cq4h

When running in Appliance mode, a command injection vulnerability exists in an undisclosed iControl REST and BIG-IP TMOS Shell (tmsh) command which may allow an authenticated attacker with administrator role privileges to execute arbitrary system commands. A successful exploit can allow the attacker to cross a security boundary.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

CVSS3: 8.7
0%
Низкий
9 месяцев назад
fstec логотип
BDU:2025-10364

Уязвимость компонента iControl REST Handler средства контроля доступа и удаленной аутентификации BIG-IP, позволяющая нарушителю выполнить произвольные команды

CVSS3: 8.7
0%
Низкий
9 месяцев назад

Уязвимостей на страницу