Back to VulnFeed / CVE-2026-7781
root@hackertop:~/vulnfeed/CVE-2026-7781#
CVE-2026-7781 LOW CVE ⚠ Unpatched · Zero-day◉ PoC 公开 Lifecycle 4/7

Open5GS up to 2.7.7 amf-3gpp-access Endpoint /src/udm/nudm-handler.c udm_nudm_uecm_handle_amf_registration_update denial of service

Open5GS 16d ago Impact pending confirmation
LIFECYCLE
3.9 CVSS
Vulnerability Detail Mitigation Lifecycle CVSS Assessment
Vulnerability Description
A vulnerability was found in Open5GS up to 2.7.7. It has been classified as problematic. Affected is the function udm_nudm_uecm_handle_amf_registration_update of the file /src/udm/nudm-handler.c of the component amf-3gpp-access Endpoint. There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Root Cause Analysis
CWE is classifying the issue as CWE-404. The product does not release or incorrectly releases a resource before it is made available for re-use.

Impact: This is going to have an impact on availability.

Exploit: The exploit is shared for download at github.com. It is declared as proof-of-concept. The project was informed of the problem early through an issue report but has not responded yet.

Countermeasure: There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Validation (PoC/EXP) - Looking for Contributors
No public PoC yet

Public validation traces already exist. Community contributors can extend them with richer reproduction content.

Contribute Your PoC/EXP
Log in to contribute PoC/EXP content. Log in
Back to VulnFeed
CVE-2026-7781 · CVSS 3.9 · Active Threat