A security vulnerability has been detected in Open5GS up to 2.7.6. Impacted is the function sgwc_s11_handle_create_indirect_data_forwarding_tunnel_request of the file /src/sgwc/s11-handler.c of the component SGWC. Such manipulation leads to reachable assertion. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. A patch should be applied to remediate this issue. The issue report is flagged as already-fixed.
References
| Link | Resource |
|---|---|
| https://github.com/open5gs/open5gs/ | Product |
| https://github.com/open5gs/open5gs/issues/4270 | Exploit Issue Tracking Vendor Advisory |
| https://github.com/open5gs/open5gs/issues/4270#event-21968624624 | Issue Tracking |
| https://github.com/open5gs/open5gs/issues/4270#issue-3795141303 | Exploit Issue Tracking Vendor Advisory |
| https://vuldb.com/?ctiid.343635 | Permissions Required VDB Entry |
| https://vuldb.com/?id.343635 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.741191 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2026-02-02 01:15
Updated : 2026-02-11 19:34
NVD link : CVE-2026-1736
Mitre link : CVE-2026-1736
CVE.ORG link : CVE-2026-1736
JSON object : View
Products Affected
open5gs
- open5gs
CWE
CWE-617
Reachable Assertion
