F5 BIG-IP Vulnerability scope

F5’s BIG-IP is a family of products covering software and hardware designed around application availability, access control, and security solutions

BIG-IP software products are modules that run on top of F5’s Traffic Management Operation System® (TMOS).  This custom operating system is an event driven operating system designed specifically to inspect network and application traffic and make real-time decisions based on the configurations provided.

We are currently looking for the following items on F5 Big IP:

  • Code/command execution
  • Authentication bypass
  • Command injection

 

Think you figured out how to run unauthenticated commands on F5 Big IP? We are paying up to $300,000 USD in payouts! 

No Bug Bounty hassle, only BIG payouts