CVE-2026-1586

A flaw has been found in Open5GS up to 2.7.5. Impacted is the function ogs_gtp2_f_teid_to_ip of the file /sgwc/s11-handler.c of the component SGWC. Executing a manipulation can lead to denial of service. The attack may be performed from remote. The exploit has been published and may be used. It is advisable to implement a patch to correct this issue. The issue report is flagged as already-fixed.
References
Link Resource
https://github.com/open5gs/open5gs/issues/4273 Exploit Issue Tracking Vendor Advisory
https://github.com/open5gs/open5gs/issues/4273#event-21968643659 Issue Tracking Exploit Vendor Advisory
https://github.com/open5gs/open5gs/issues/4273#issue-3796030721 Exploit Issue Tracking Vendor Advisory
https://vuldb.com/?ctiid.343349 Permissions Required VDB Entry
https://vuldb.com/?id.343349 Third Party Advisory VDB Entry
https://vuldb.com/?submit.738375 Third Party Advisory VDB Entry Exploit
Configurations

Configuration 1 (hide)

cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-01-29 13:15

Updated : 2026-02-02 18:43


NVD link : CVE-2026-1586

Mitre link : CVE-2026-1586

CVE.ORG link : CVE-2026-1586


JSON object : View

Products Affected

open5gs

  • open5gs
CWE
CWE-404

Improper Resource Shutdown or Release