No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 01 May 2026 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was determined in Open5GS up to 2.7.7. This vulnerability affects the function bsf_sess_add_by_ip_address of the file /nbsf-management/v1/pcfBindings of the component BSF. Executing a manipulation of the argument ipv4Addr can lead to denial of service. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet. | |
| Title | Open5GS BSF pcfBindings bsf_sess_add_by_ip_address denial of service | |
| First Time appeared |
Open5gs
Open5gs open5gs |
|
| Weaknesses | CWE-404 | |
| CPEs | cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Open5gs
Open5gs open5gs |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-01T01:15:11.824Z
Reserved: 2026-04-30T18:17:36.611Z
Link: CVE-2026-7536
No data.
Status : Received
Published: 2026-05-01T02:16:04.347
Modified: 2026-05-01T02:16:04.347
Link: CVE-2026-7536
No data.
OpenCVE Enrichment
Updated: 2026-05-01T03:30:07Z