The vulnerability is a classic nil pointer dereference in the DataChangeNotificationProcedure function located in internal/sbi/processor/notifier.go. The vulnerability description explicitly points to this function. The provided patch in commit 65d7070f4bfd016864cbbaefbd506bbc85d2fa92 confirms this. The original code retrieves a UE context using p.Context().UdmUeFindBySupi(supi) but fails to check if the returned context is nil. An attacker can send a request with a supi that does not correspond to any existing UE, causing the function to receive a nil pointer. Subsequent operations on this nil pointer lead to a panic and a denial of service. The patch rectifies this by checking the boolean returned by UdmUeFindBySupi and returning early if the UE context is not found. The HTTP handler Server.HandleDataChangeNotificationToNF in internal/sbi/api_httpcallback.go is the entry point that forwards the request to the vulnerable function, making it a key part of the exploitation path.