Description
Open5GS v2.7.5, prior to commit 67ba7f92bbd7a378954895d96d9d7b05d5b64615, is vulnerable to a NULL pointer dereference when a multipart/related HTTP POST request with an empty HTTP body is sent to the SBI of either AMF, AUSF, BSF, NRF, NSSF, PCF, SMF, UDM, or UDR, resulting in a denial of service. This occurs in the parse_multipart function in lib/sbi/message.c.
References (3)
Core 3
Core References
Exploit, Issue Tracking
https://github.com/open5gs/open5gs/issues/3942
Exploit, Third Party Advisory
https://github.com/tsiamoulis/vuln-research/tree/main/CVE-2025-55904
Scores
CVSS v3
4.0
EPSS
0.0007
EPSS Percentile
21.2%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-476
Status
published
Products (1)
open5gs/open5gs
< 2.7.6
Published
Sep 17, 2025
Tracked Since
Feb 18, 2026