{"vulnerability": "CVE-2025-20029", "sightings": [{"uuid": "19c9c16a-8261-4356-90c5-e1ec7dcfbe9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20029", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113953196776332903", "content": "", "creation_timestamp": "2025-02-05T20:36:33.074843Z"}, {"uuid": "c125103c-cea7-4312-8cb4-75d6e43e4191", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20029", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhhljgossz27", "content": "", "creation_timestamp": "2025-02-05T22:08:53.702011Z"}, {"uuid": "dbcd5551-4a57-4c87-8541-5d472471778e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20029", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113952492462136812", "content": "", "creation_timestamp": "2025-02-05T17:37:26.201887Z"}, {"uuid": "46e783cf-0253-47a2-b547-ee1bc6e35611", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20029", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhh6jyudev2h", "content": "", "creation_timestamp": "2025-02-05T18:16:31.371808Z"}, {"uuid": "da4a5066-5009-4fde-bbde-a161aadd5c9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20029", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113952771259642555", "content": "", "creation_timestamp": "2025-02-05T18:48:34.026514Z"}, {"uuid": "8736ec8f-dd4f-4dae-aba2-b8b5646153e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20029", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lj4x5p4koc2k", "content": "", "creation_timestamp": "2025-02-27T03:28:12.222230Z"}, {"uuid": "022c55cb-a4a8-4e1d-a359-09acbaeddaf9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20029", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lj5b53hxly2m", "content": "", "creation_timestamp": "2025-02-27T06:26:46.251864Z"}, {"uuid": "55deb8cb-2c5d-4f0c-a8db-326100c8b443", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-20029", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3lj5iu6k7zk2w", "content": "", "creation_timestamp": "2025-02-27T08:44:56.569744Z"}, {"uuid": "12b047b2-ae4a-419a-9ea5-54d970fe7e18", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20029", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3ljqdjoicut2c", "content": "", "creation_timestamp": "2025-03-06T20:30:10.895649Z"}, {"uuid": "affa1b8b-2806-4c43-8f26-2afa2ac4c544", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20029", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3lj6lviv7kk2m", "content": "", "creation_timestamp": "2025-02-27T19:12:05.183314Z"}, {"uuid": "7d139268-4319-4359-89f3-31d2972aa64d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20029", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-18T13:31:23.000000Z"}, {"uuid": "0165f89c-d6b8-4080-a013-b520a17b89ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20029", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-19T02:47:45.000000Z"}, {"uuid": "545cc74c-9858-4ee2-ae36-b722c64f82f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20029", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/15093", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-20029: Command Injection in TMSH CLI in F5 BIG-IP\nURL\uff1ahttps://github.com/mbadanoiu/CVE-2025-20029\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-02-23T19:02:21.000000Z"}, {"uuid": "f855f456-97a1-4783-bfec-6cc4e097af76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20029", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5456", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-20029\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Command injection vulnerability exists in iControl REST and BIG-IP TMOS Shell (tmsh) save command, which may allow an authenticated attacker to execute arbitrary system commands.\n\n \n\n\nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n\ud83d\udccf Published: 2025-02-05T17:31:06.455Z\n\ud83d\udccf Modified: 2025-02-26T04:55:26.913Z\n\ud83d\udd17 References:\n1. https://my.f5.com/manage/s/article/K000148587", "creation_timestamp": "2025-02-26T05:26:38.000000Z"}, {"uuid": "42ab1942-5324-42a6-aec6-da5e520d35ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20029", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/35132", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aSimulated environment for CVE-2025-20029 using Docker. Includes PoC and auto-reporting.\nURL\uff1ahttps://github.com/schoi1337/CVE-2025-20029-simulation\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-05-01T06:00:25.000000Z"}, {"uuid": "f839ecc1-836d-405b-a882-11ecdf787cd4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20029", "type": "published-proof-of-concept", "source": "https://t.me/CyberBulletin/2419", "content": "\u26a1CVE-2025-20029: Command Injection Flaw Discovered in F5 BIG-IP System, PoC Releases.\n\n#CyberBulletin", "creation_timestamp": "2025-02-28T04:57:07.000000Z"}, {"uuid": "2ad4a3f6-6a07-44e0-8920-f75e5ff628e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20029", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/2585", "content": "#exploit\n1. CVE-2025-20029:\nCommand Injection in TMSH CLI in F5 BIG-IP\nhttps://github.com/mbadanoiu/CVE-2025-20029\n\n2. Dropping a 0 day:\nParallels Desktop Repack Root Privilege Escalation (CVE-2024-34331)\nhttps://jhftss.github.io/Parallels-0-day\n\n3. CVE-2025-21669/CVE-2025-21670:\nvsock/virtio: discard packets if the transport changes / vsock/bpf: return early if transport is not assigned (Linux Kernel)\nhttps://u1f383.github.io/linux/2025/02/24/linux-kernel-some-vsock-vulnerabilities-analysis.html", "creation_timestamp": "2025-02-28T07:48:31.000000Z"}, {"uuid": "0a1c2613-b40a-40eb-8fd0-665d9e5dfddf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20029", "type": "published-proof-of-concept", "source": "Telegram/Z0ari8MHZAzBUd7K9yxhwtBySsURYEVG61pidF9swyP9zTE", "content": "", "creation_timestamp": "2025-05-01T13:00:06.000000Z"}, {"uuid": "b068e8ff-9fab-413e-8ac6-e1db0375c8dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20029", "type": "published-proof-of-concept", "source": "Telegram/iKE-ifN8C4jbKlxJZm9dPRBcrWriwuOpiCrJGZ4kRda8BQ8", "content": "", "creation_timestamp": "2025-02-24T04:00:07.000000Z"}, {"uuid": "f74019b6-8509-4095-804e-ee0b2f299f76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-20029", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11859", "content": "#exploit\n1. CVE-2025-20029:\nCommand Injection in TMSH CLI in F5 BIG-IP\nhttps://github.com/mbadanoiu/CVE-2025-20029\n\n2. Dropping a 0 day:\nParallels Desktop Repack Root Privilege Escalation (CVE-2024-34331)\nhttps://jhftss.github.io/Parallels-0-day\n\n3. CVE-2025-21669/CVE-2025-21670:\nvsock/virtio: discard packets if the transport changes / vsock/bpf: return early if transport is not assigned (Linux Kernel)\nhttps://u1f383.github.io/linux/2025/02/24/linux-kernel-some-vsock-vulnerabilities-analysis.html", "creation_timestamp": "2025-02-26T00:08:02.000000Z"}]}