The vulnerability lies in the lack of input validation for path parameters in several HTTP handlers of the free5GC UDM's Nudm_SubscriberDataManagement API. The core issue is that user-provided identifiers from the URL path (like 'supi' and 'ueId') were used without being sanitized. An attacker could inject a URL-encoded null byte (%00) into these parameters. When the application later attempted to use these tainted identifiers to construct a new URL for a request to a downstream service (the UDR), Go's net/url library would correctly reject the string due to the invalid control character. This rejection resulted in an unhandled error, causing the server to return a 500 Internal Server Error and effectively crashing the request processing, leading to a denial of service. The patch addresses this by introducing validation checks at the beginning of each affected HTTP handler (HandleGetAmData, HandleUnsubscribe, HandleModify, HandleGetIdTranslationResult) to ensure that the identifiers conform to the expected format before they are processed.