CVE-2025-31644
Appliance mode BIG-IP iControl REST and tmsh vulnerability
CVSS Score
8.7
EPSS Score
0.0%
EPSS Percentile
0th
When running in Appliance mode, a command injection vulnerability exists in an undisclosed iControl REST and BIG-IP TMOS Shell (tmsh) command which may allow an authenticated attacker with administrator role privileges to execute arbitrary system commands. A successful exploit can allow the attacker to cross a security boundary.Β Β Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
| CWE | CWE-77 |
| Vendor | f5 |
| Product | big-ip |
| Published | May 7, 2025 |
| Last Updated | Feb 26, 2026 |
Stay Ahead of the Next One
Get instant alerts for f5 big-ip
Be the first to know when new high vulnerabilities affecting f5 big-ip are published β delivered to Slack, Telegram or Discord.
Get Free Alerts β
Free Β· No credit card Β· 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
None
Affected Versions
F5 / BIG-IP
17.1.0 < 17.1.2.2 16.1.0 < 16.1.6 15.1.0 < 15.1.10.7
References
Credits
F5 acknowledges Matei "Mal" Badanoiu @ Deloitte for bringing this issue to our attention and following the highest standards of coordinated disclosure.