CVE-2026-2517
Open5GS SMF types.c ogs_gtp2_parse_tft denial of service
CVSS Score
5.3
EPSS Score
0.0%
EPSS Percentile
0th
A security flaw has been discovered in Open5GS up to 2.7.6. This vulnerability affects the function ogs_gtp2_parse_tft in the library lib/gtp/v2/types.c of the component SMF. Performing a manipulation of the argument pf[0].content.length results in denial of service. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
| CWE | CWE-404 |
| Vendor | n/a |
| Product | open5gs |
| Published | Feb 15, 2026 |
| Last Updated | Feb 23, 2026 |
Stay Ahead of the Next One
Get instant alerts for n/a open5gs
Be the first to know when new medium vulnerabilities affecting n/a open5gs are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
n/a / Open5GS
2.7.0 2.7.1 2.7.2 2.7.3 2.7.4 2.7.5 2.7.6
References
vuldb.com: https://vuldb.com/?id.346108 vuldb.com: https://vuldb.com/?ctiid.346108 vuldb.com: https://vuldb.com/?submit.738332 github.com: https://github.com/open5gs/open5gs/issues/4281 github.com: https://github.com/open5gs/open5gs/issues/4281#issue-3807802287 github.com: https://github.com/open5gs/open5gs/
Credits
๐ LinZiyu (VulDB User)