A missing length check in `ogs_pfcp_dev_add` function from PFCP library, used by both smf and upf in open5gs 2.7.2 and earlier, allows a local attacker to cause a Buffer Overflow by changing the `session.dev` field with a value with length greater than 32.
References
Link | Resource |
---|---|
https://gist.github.com/scmdcs/6d878d6074f0e2f4a8fb69e9864068b7 | Exploit Third Party Advisory |
https://github.com/open5gs/open5gs/issues/3775 | Exploit Issue Tracking |
Configurations
History
09 Jul 2025, 18:35
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-18 16:15
Updated : 2025-07-09 18:35
NVD link : CVE-2025-44951
Mitre link : CVE-2025-44951
CVE.ORG link : CVE-2025-44951
JSON object : View
Products Affected
open5gs
- open5gs
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')