CVE-2026-1586

A flaw has been found in Open5GS up to 2.7.5. Impacted is the function ogs_gtp2_f_teid_to_ip of the file /sgwc/s11-handler.c of the component SGWC. Executing a manipulation can lead to denial of service. The attack may be performed from remote. The exploit has been published and may be used. It is advisable to implement a patch to correct this issue. The issue report is flagged as already-fixed.
References
Link Resource
https://github.com/open5gs/open5gs/
https://github.com/open5gs/open5gs/issues/4273 Exploit Issue Tracking Vendor Advisory
https://github.com/open5gs/open5gs/issues/4273#event-21968643659 Exploit Issue Tracking Vendor Advisory
https://github.com/open5gs/open5gs/issues/4273#issue-3796030721 Exploit Issue Tracking Vendor Advisory
https://vuldb.com/?ctiid.343349 Permissions Required VDB Entry
https://vuldb.com/?id.343349 Third Party Advisory VDB Entry
https://vuldb.com/?submit.738375 Exploit Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*

History

23 Feb 2026, 09:16

Type Values Removed Values Added
References
  • () https://github.com/open5gs/open5gs/ -
References () https://github.com/open5gs/open5gs/issues/4273#event-21968643659 - Issue Tracking, Exploit, Vendor Advisory () https://github.com/open5gs/open5gs/issues/4273#event-21968643659 - Exploit, Issue Tracking, Vendor Advisory
References () https://vuldb.com/?submit.738375 - Third Party Advisory, VDB Entry, Exploit () https://vuldb.com/?submit.738375 - Exploit, Third Party Advisory, VDB Entry

02 Feb 2026, 18:43

Type Values Removed Values Added
CPE cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*
References () https://github.com/open5gs/open5gs/issues/4273 - () https://github.com/open5gs/open5gs/issues/4273 - Exploit, Issue Tracking, Vendor Advisory
References () https://github.com/open5gs/open5gs/issues/4273#event-21968643659 - () https://github.com/open5gs/open5gs/issues/4273#event-21968643659 - Issue Tracking, Exploit, Vendor Advisory
References () https://github.com/open5gs/open5gs/issues/4273#issue-3796030721 - () https://github.com/open5gs/open5gs/issues/4273#issue-3796030721 - Exploit, Issue Tracking, Vendor Advisory
References () https://vuldb.com/?ctiid.343349 - () https://vuldb.com/?ctiid.343349 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.343349 - () https://vuldb.com/?id.343349 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.738375 - () https://vuldb.com/?submit.738375 - Third Party Advisory, VDB Entry, Exploit
First Time Open5gs open5gs
Open5gs

29 Jan 2026, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-29 13:15

Updated : 2026-02-23 09:16


NVD link : CVE-2026-1586

Mitre link : CVE-2026-1586

CVE.ORG link : CVE-2026-1586


JSON object : View

Products Affected

open5gs

  • open5gs
CWE
CWE-404

Improper Resource Shutdown or Release