Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-41067 PoC — Reachable Assertion vulnerability in Open5GS

Source
Associated Vulnerability
Title:Reachable Assertion vulnerability in Open5GS (CVE-2025-41067)
Description:Reachable Assertion vulnerability in Open5GS up to version 2.7.6 allows attackers with connectivity to the NRF to cause a denial of service. An SBI request that deletes the NRF's own registry causes a check that ends up crashing the NRF process and renders the discovery service unavailable.
Description
This repository contains the Proof-of-Concept (PoC) exploit scripts for two vulnerabilities, CVE-2025-41067 and CVE-2025-41068. These vulnerabilities affect the NRF (Network Repository Function) component of Open5GS in versions prior to 2.7.6 and can be triggered by an attacker to cause a Denial of Service (DoS).
Readme
# Open5GS NRF Denial of Service (CVE-2025-41067 & CVE-2025-41068)

This repository contains Proof-of-Concept (PoC) exploit scripts for two high-severity vulnerabilities discovered in NewPlane's Open5GS. These vulnerabilities can be triggered by an attacker to cause a Denial of Service (DoS) in the NRF (Network Repository Function) component.

## Vulnerability Details

*   **CVEs:** `CVE-2025-41067`, `CVE-2025-41068`
*   **Affected Software:** Open5GS
*   **Affected Component:** Network Repository Function (NRF)
*   **Affected Versions:** Prior to `2.7.6`
*   **Impact:** Denial of Service (DoS)
*   **GitHub Issues:**
    * [CVE-2025-41067](https://github.com/open5gs/open5gs/issues/3845)
    * [CVE-2025-41068](https://github.com/open5gs/open5gs/issues/3846)

## Official Advisory

The coordinated disclosure and official advisory for these vulnerabilities can be found on INCIBE's website:
*   [**INCIBE-CERT Advisory: Multiple vulnerabilities in NewPlane's Open5GS**](https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-newplanes-open5gs)

## Description

The vulnerabilities are reachable assertions within the Open5GS NRF. An attacker with network connectivity to the NRF's HTTP/2 interface can send specific sequences of API requests that cause the `open5gs-nrfd` process to crash. This renders the 5G network's discovery service inoperable.

This repository includes two distinct scripts to trigger the crash through different methods.

### Scripts Included

1.  **`CVE-2025-41067.py`**
    This script triggers the vulnerability by performing the following actions:
    *   It queries the `/nnrf-nfm/v1/nf-instances` endpoint to get a list of all network functions.
    *   It iterates through the results, identifying any instances where `nfType` is `NRF`.
    *   It then sends a `DELETE` request for each identified NRF instance. This action on a self-referential instance causes the NRF process to crash.

2.  **`CVE-2025-41068.py`**
    This script triggers a similar vulnerability through a different vector:
    *   It first sends a `PUT` request to register a new NF instance with a **non-existent `nfType` ('EMF')**.
    *   Subsequently, when the script requests a list of all NF instances, the NRF attempts to process this invalid entry, which crashes the service.

## Prerequisites

*   Python 3.6+
*   The `httpx` library with HTTP/2 support.

You can install the necessary dependency with pip:
```bash
pip install -r requirements.txt
```

## Usage

Both scripts are run from the command line, with the IP address of the target Open5GS NRF as the only argument.

**To run the deletion-based exploit:**
```bash
python CVE-2025-41067.py <NRF_TARGET_IP>
```

**To run the registration-based exploit:**
```bash
python CVE-2025-41068.py <NRF_TARGET_IP>
```

**Example:**
```bash
python CVE-2025-41067.py 192.168.50.10
```

## Disclaimer

These scripts are intended for educational purposes, authorized security testing, and research only. The author is not responsible for any misuse or damage caused by these tools. Always obtain explicit permission before testing on any system you do not own.

## Acknowledgments
*   The **Open5GS team** for their prompt response and for providing a patch in version `v2.7.6`.
File Snapshot

[4.0K] /data/pocs/0f9e77b617edc0e043fec5e7570f29623825c0c3 ├── [2.8K] CVE-2025-41067.py ├── [2.5K] CVE-2025-41068.py ├── [3.2K] README.md └── [ 13] requirements.txt 1 directory, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →