A missing length check in `ogs_pfcp_subnet_add` function from PFCP library, used by both smf and upf in open5gs 2.7.2 and earlier, allows a local attacker to cause a Buffer Overflow by changing the `session.dnn` field with a value with length greater than 101.
https://github.com/open5gs/open5gs/issues/3775
https://gist.github.com/scemodicecosa/8643fbfc9490f40e955e9f9e9b0d9077