Hi, Linked below is an advisory regarding remote command execution (as root, possibly) vulnerabilities within the iControl API: http://support.f5.com/kb/en-us/solutions/public/15000/200/sol15220.html An example request that will set the hostname to 'root.example.com': `whoami`.example.com This was responsibly disclosed to F5 on the 7th of February. If you would like the full communication timeline, feel free to ask.