A vulnerability was found in Free5GC pcf up to 1.4.1. It has been rated as problematic. This affects the function HandleCreateSmPolicyRequest of the file internal/sbi/processor/smpolicy.go. The manipulation leads to null pointer dereference.
This vulnerability is uniquely identified as CVE-2026-1739. The attack is possible to be carried out remotely. Moreover, an exploit is present.
Applying a patch is the recommended action to fix this issue.
A vulnerability was found in Open5GS up to 2.7.6. It has been declared as problematic. The impacted element is the function sgwc_tunnel_add of the file /src/sgwc/context.c of the component SGWC. Executing a manipulation of the argument pdr can lead to reachable assertion.
This vulnerability is handled as CVE-2026-1738. The attack can be executed remotely. Additionally, an exploit exists.
It is advisable to implement a patch to correct this issue.
The issue report is flagged as already-fixed.
A vulnerability was found in Open5GS up to 2.7.6. It has been classified as problematic. The affected element is the function sgwc_s5c_handle_create_bearer_request of the file /src/sgwc/s5c-handler.c of the component CreateBearerRequest Handler. Performing a manipulation results in reachable assertion.
This vulnerability is known as CVE-2026-1737. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
To fix this issue, it is recommended to deploy a patch.
The issue report is flagged as already-fixed.
A vulnerability was found in Open5GS up to 2.7.6 and classified as problematic. Impacted is the function sgwc_s11_handle_create_indirect_data_forwarding_tunnel_request of the file /src/sgwc/s11-handler.c of the component SGWC. Such manipulation leads to reachable assertion.
This vulnerability is traded as CVE-2026-1736. The attack may be launched remotely. Furthermore, there is an exploit available.
A patch should be applied to remediate this issue.
The issue report is flagged as already-fixed.
A vulnerability has been found in Yealink MeetingBar A30 133.321.0.3 and classified as critical. This issue affects some unknown processing of the component Diagnostic Handler. This manipulation causes command injection.
This vulnerability appears as CVE-2026-1735. It is feasible to perform the attack on the physical device. In addition, an exploit is available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability, which was classified as problematic, was found in Zhong Bang CRMEB up to 5.6.3. This vulnerability affects unknown code of the file crmeb/app/api/controller/v1/CrontabController.php of the component crontab Endpoint. The manipulation results in missing authorization.
This vulnerability is reported as CVE-2026-1734. The attack can be launched remotely. Moreover, an exploit is present.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability, which was classified as problematic, has been found in Zhong Bang CRMEB up to 5.6.3. This affects the function detail/tidyOrder of the file /api/store_integral/order/detail/:uni. The manipulation of the argument order_id leads to improper authorization.
This vulnerability is documented as CVE-2026-1733. The attack can be initiated remotely. Additionally, an exploit exists.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability classified as critical was found in SunFounder Pironman Dashboard up to 1.3.13. Affected by this issue is some unknown functionality. Executing a manipulation of the argument filename can lead to path traversal.
This vulnerability is registered as CVE-2026-25069. It is possible to launch the attack remotely. No exploit is available.