CVE-2026-2521

A weakness has been identified in Open5GS up to 2.7.6. This issue affects the function sgwc_s5c_handle_create_session_response of the component SGW-C. Executing a manipulation can lead to memory corruption. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
References
Link Resource
https://github.com/open5gs/open5gs/ Product
https://github.com/open5gs/open5gs/issues/4282 Exploit Issue Tracking Vendor Advisory
https://github.com/open5gs/open5gs/issues/4282#issue-3807902188 Exploit Issue Tracking Vendor Advisory
https://vuldb.com/?ctiid.346109 Permissions Required VDB Entry
https://vuldb.com/?id.346109 Third Party Advisory VDB Entry
https://vuldb.com/?submit.738334 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*

History

18 Feb 2026, 19:42

Type Values Removed Values Added
References () https://github.com/open5gs/open5gs/ - () https://github.com/open5gs/open5gs/ - Product
References () https://github.com/open5gs/open5gs/issues/4282 - () https://github.com/open5gs/open5gs/issues/4282 - Exploit, Issue Tracking, Vendor Advisory
References () https://github.com/open5gs/open5gs/issues/4282#issue-3807902188 - () https://github.com/open5gs/open5gs/issues/4282#issue-3807902188 - Exploit, Issue Tracking, Vendor Advisory
References () https://vuldb.com/?ctiid.346109 - () https://vuldb.com/?ctiid.346109 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.346109 - () https://vuldb.com/?id.346109 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.738334 - () https://vuldb.com/?submit.738334 - Third Party Advisory, VDB Entry
First Time Open5gs open5gs
Open5gs
CPE cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*

18 Feb 2026, 17:52

Type Values Removed Values Added
Summary
  • (es) Se ha identificado una debilidad en Open5GS hasta la versión 2.7.6. Este problema afecta a la función sgwc_s5c_handle_create_session_response del componente SGW-C. La ejecución de una manipulación puede llevar a corrupción de memoria. El ataque puede realizarse de forma remota. El exploit se ha puesto a disposición del público y podría utilizarse para ataques. El proyecto fue informado del problema con antelación a través de un informe de problema, pero aún no ha respondido.

15 Feb 2026, 23:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-15 23:16

Updated : 2026-02-18 19:42


NVD link : CVE-2026-2521

Mitre link : CVE-2026-2521

CVE.ORG link : CVE-2026-2521


JSON object : View

Products Affected

open5gs

  • open5gs
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer