A flaw has been found in Open5GS up to 2.7.5. Impacted is the function ogs_gtp2_f_teid_to_ip of the file /sgwc/s11-handler.c of the component SGWC. Executing a manipulation can lead to denial of service. The attack may be performed from remote. The exploit has been published and may be used. It is advisable to implement a patch to correct this issue. The issue report is flagged as already-fixed.
References
| Link | Resource |
|---|---|
| https://github.com/open5gs/open5gs/issues/4273 | Exploit Issue Tracking Vendor Advisory |
| https://github.com/open5gs/open5gs/issues/4273#event-21968643659 | Issue Tracking Exploit Vendor Advisory |
| https://github.com/open5gs/open5gs/issues/4273#issue-3796030721 | Exploit Issue Tracking Vendor Advisory |
| https://vuldb.com/?ctiid.343349 | Permissions Required VDB Entry |
| https://vuldb.com/?id.343349 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.738375 | Third Party Advisory VDB Entry Exploit |
Configurations
History
No history.
Information
Published : 2026-01-29 13:15
Updated : 2026-02-02 18:43
NVD link : CVE-2026-1586
Mitre link : CVE-2026-1586
CVE.ORG link : CVE-2026-1586
JSON object : View
Products Affected
open5gs
- open5gs
CWE
CWE-404
Improper Resource Shutdown or Release
