loader image
F5 Flaw Lets Admins Run Rogue Commands as Root

F5 Networks has disclosed a high-severity command injection vulnerability affecting its BIG-IP products operating in Appliance mode. Tracked as CVE-2025-31644, the flaw resides in an undisclosed iControl REST endpoint and a TMOS Shell (tmsh) command, allowing authenticated attackers to execute arbitrary system commands by bypassing security restrictions. The vulnerability is rated 8.7 on the CVSS v3.1 scale and 8.5 on CVSS v4.0, both classified as “High.”

The flaw, identified in the “file” parameter of the “save” command, can be exploited using shell metacharacters to inject commands executed with root privileges. A proof-of-concept exploit has been published, demonstrating the risk to systems running BIG-IP versions 17.1.0–17.1.2, 16.1.0–16.1.5, and 15.1.0–15.1.10.

F5 has released patches and advises customers to upgrade immediately. Temporary mitigations include restricting access to the iControl REST interface and SSH services. No data plane exposure has been reported.

Write a Reply or Comment

Your email address will not be published. Required fields are marked *