A security flaw has been discovered in Open5GS up to 2.7.6. This vulnerability affects the function ogs_gtp2_parse_tft in the library lib/gtp/v2/types.c of the component SMF. Performing a manipulation of the argument pf[0].content.length results in denial of service. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
References
| Link | Resource |
|---|---|
| https://github.com/open5gs/open5gs/ | Product |
| https://github.com/open5gs/open5gs/issues/4281 | Exploit Issue Tracking Vendor Advisory |
| https://github.com/open5gs/open5gs/issues/4281#issue-3807802287 | Exploit Issue Tracking Vendor Advisory |
| https://vuldb.com/?ctiid.346108 | Permissions Required VDB Entry |
| https://vuldb.com/?id.346108 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.738332 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2026-02-15 13:16
Updated : 2026-02-18 20:48
NVD link : CVE-2026-2517
Mitre link : CVE-2026-2517
CVE.ORG link : CVE-2026-2517
JSON object : View
Products Affected
open5gs
- open5gs
CWE
CWE-404
Improper Resource Shutdown or Release
