Checker CVE-2020-5902: BIG-IP Versions Suffer From Traffic Management User Interface (TMUI) Arbitrary File Read And C ommand Execution Vulnerabilities
+ Autor: MrCl0wn
+ Blog: http://blog.mrcl0wn.com
+ GitHub: https://github.com/MrCl0wnLab
+ Twitter: https://twitter.com/MrCl0wnLab
+ Email: mrcl0wnlab\@\gmail.com
REF BIG-IP TMUI Remote Code Execution
https://engineeringjobs4u.co.uk/helping-to-protect-against-the-f5-tmui-rce-vulnerability https://packetstormsecurity.com/files/158333/BIG-IP-TMUI-Remote-Code-Execution.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5902
Warning
+------------------------------------------------------------------------------+
| [!] Legal disclaimer: Usage of checker-CVE-2020-5902 for attacking |
| targets without prior mutual consent is illegal. |
| It is the end user's responsibility to obey all applicable |
| local, state and federal laws. |
| Developers assume no liability and are not responsible for any misuse or |
| damage caused by this program |
+------------------------------------------------------------------------------+
IP Scan / Range
Usage
$ python3.8 checker.py <ip_start> <ip_end>
$ python3.8 checker.py 192.168.15.1 192.168.15.86
Output
output.log
error.log