An unauthenticated attacker with network access to the TMUI may be able to execute arbitrary system commands, create or delete files, disable services, and subsequently execute arbitrary code with high privileges such as root. An authenticated user is also be able to perform unexpected activities such as changing configuration files on a vulnerable device. The vulnerability can be abused to achieve arbitrary code execution on the target device with root privileges.
Arbitrary code execution
Traffic Management User Interface (TMUI)
It is recommended to upgrade to the latest secure and stable software provided by F5.