We found results for “”
CVE-2025-68132
Good to know:
Date: January 21, 2026
EVerest is an EV charging software stack. Prior to version 2025.12.0, "is_message_crc_correct" in the DZG_GSH01 powermeter SLIP parser reads "vec[vec.size()-1]" and "vec[vec.size()-2]" without checking that at least two bytes are present. Malformed SLIP frames on the serial link can reach "is_message_crc_correct" with "vec.size() < 2" (only via the multi-message path), causing an out-of-bounds read before CRC verification and "pop_back" underflow. Therefore, an attacker controlling the serial input can reliably crash the process. Version 2025.12.0 fixes the issue.
Severity Score
Severity Score
Weakness Type (CWE)
Out-of-bounds Read
CWE-125Top Fix
Upgrade Version
Upgrade to version https://github.com/EVerest/everest-core.git - 2025.12.0
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | PHYSICAL |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | NONE |
| Integrity (I): | NONE |
| Availability (A): | LOW |
Vulnerabilities
Projects
Contact Us


