CVE-2026-2517

A security flaw has been discovered in Open5GS up to 2.7.6. This vulnerability affects the function ogs_gtp2_parse_tft in the library lib/gtp/v2/types.c of the component SMF. Performing a manipulation of the argument pf[0].content.length results in denial of service. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
References
Link Resource
https://github.com/open5gs/open5gs/ Product
https://github.com/open5gs/open5gs/issues/4281 Exploit Issue Tracking Vendor Advisory
https://github.com/open5gs/open5gs/issues/4281#issue-3807802287 Exploit Issue Tracking Vendor Advisory
https://vuldb.com/?ctiid.346108 Permissions Required VDB Entry
https://vuldb.com/?id.346108 Third Party Advisory VDB Entry
https://vuldb.com/?submit.738332 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-02-15 13:16

Updated : 2026-02-18 20:48


NVD link : CVE-2026-2517

Mitre link : CVE-2026-2517

CVE.ORG link : CVE-2026-2517


JSON object : View

Products Affected

open5gs

  • open5gs
CWE
CWE-404

Improper Resource Shutdown or Release