Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-5902 PoC — F5 BIG-IP 路径遍历漏洞

Source
Associated Vulnerability
Title:F5 BIG-IP 路径遍历漏洞 (CVE-2020-5902)
Description:In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, the Traffic Management User Interface (TMUI), also referred to as the Configuration utility, has a Remote Code Execution (RCE) vulnerability in undisclosed pages.
Description
F5 mass scanner and  CVE-2020-5902 checker
Readme
# f5_scanner
F5 mass scanner and  CVE-2020-5902 checker

# This tool is mass scanner with 30 threads hardcoded use with caution

## How to setup
```
$ python3 -m venv venv
$ source venv/bin/activate
$ python3 -m pip install -r requirements.txt
```
## How to run

### Single IP

python3 f5_scanner.py --ip 192.168.1.1

### CIDR

python3 f5_scanner.py --cidr 192.168.0.0/24

### File
the file should be 1 by line set of single ip address eg :

```
192.168.0.1
192.168.0.2
192.168.0.3
```

python3 f5_scanner.py --file file_with_ips.txt


File Snapshot

[4.0K] /data/pocs/07ea0b9e0408d75b939267a1802fecda3c865bd4 ├── [4.0K] conf │   └── [1.5K] logging.json ├── [3.2K] f5_scanner.py ├── [ 682] logger.py ├── [ 536] README.md ├── [ 93] requirements.txt └── [1.2K] threads.py 1 directory, 6 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →