### [CVE-2021-22989](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22989) ![](https://img.shields.io/static/v1?label=Product&message=BIG-IP%20Advanced%20WAF%20or%20BIG-IP%20ASM%20in%20Appliance%20Mode&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=16.0.x%20before%2016.0.1.1%2C%2015.1.x%20before%2015.1.2.1%2C%2014.1.x%20before%2014.1.4%2C%2013.1.x%20before%2013.1.3.6%2C%2012.1.x%20before%2012.1.5.3%2C%2011.6.x%20before%2011.6.5.3%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=RCE&color=brightgreen) ### Description On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, and 11.6.x before 11.6.5.3, when running in Appliance mode with Advanced WAF or BIG-IP ASM provisioned, the TMUI, also referred to as the Configuration utility, has an authenticated remote command execution vulnerability in undisclosed pages. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated. ### POC #### Reference No PoCs from references. #### Github - https://github.com/DNTYO/F5_Vulnerability