CVE-2026-8186
Open5GS NF client.c ogs_sbi_client_send_via_scp_or_sepp out-of-bounds
CVSS Score
5.3
EPSS Score
0.0%
EPSS Percentile
14th
A vulnerability was detected in Open5GS up to 2.7.7. This affects the function ogs_sbi_client_send_via_scp_or_sepp in the library lib/sbi/client.c of the component NF. Performing a manipulation results in out-of-bounds read. The attack is possible to be carried out remotely. The patch is named d5bc487fcf9ea87d2b03f2ef95123af344773bfb. It is suggested to install a patch to address this issue.
| CWE | CWE-125 CWE-119 |
| Vendor | n/a |
| Product | open5gs |
| Published | May 9, 2026 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for n/a open5gs
Be the first to know when new medium vulnerabilities affecting n/a open5gs are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:X/RL:O/RC:C Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
n/a / Open5GS
2.7.0 2.7.1 2.7.2 2.7.3 2.7.4 2.7.5 2.7.6 2.7.7
References
vuldb.com: https://vuldb.com/vuln/362338 vuldb.com: https://vuldb.com/vuln/362338/cti vuldb.com: https://vuldb.com/submit/800024 github.com: https://github.com/open5gs/open5gs/issues/4491 github.com: https://github.com/open5gs/open5gs/pull/4496 github.com: https://github.com/open5gs/open5gs/commit/d5bc487fcf9ea87d2b03f2ef95123af344773bfb github.com: https://github.com/open5gs/open5gs/
Credits
๐ 0wln3d (VulDB User)