The emergence of 5G networks brings substantial enhancements in data rates and connectivity. However, these advanced capabilities also present new vulnerabilities, particularly concerning the legacy Signalling System No. 7 (SS7) protocol. SS7 attacks can utilize weaknesses in this protocol to intercept sensitive user information, including call det