Everest

11 CVEs product

Monthly

CVE-2026-24003 MEDIUM This Month

EVerest is an EV charging software stack. [CVSS 4.3 MEDIUM]

Authentication Bypass Everest
NVD GitHub
CVSS 3.1
4.3
EPSS
0.2%
CVE-2026-23955 MEDIUM POC This Month

Everest EV charging software prior to version 2025.9.0 contains an improper pointer arithmetic flaw in error handling where integer values are concatenated to strings, allowing local operators with high privileges to read sensitive memory regions including heap and stack data. Public exploit code exists for this vulnerability. The flaw requires user interaction and is resolved in version 2025.9.0, though patches remain unavailable for affected earlier versions.

Information Disclosure Everest
NVD GitHub
CVSS 3.1
4.2
EPSS
0.0%
CVE-2025-68141 HIGH POC This Week

EVerest is an EV charging software stack. Prior to version 2025.10.0, during the deserialization of a `DC_ChargeLoopRes` message that includes Receipt as well as TaxCosts, the vector `<DetailedTax>tax_costs` in the target `Receipt` structure is accessed out of bounds. [CVSS 7.4 HIGH]

Null Pointer Dereference Deserialization Everest
NVD GitHub
CVSS 3.1
7.4
EPSS
0.1%
CVE-2025-68140 MEDIUM This Month

EVerest is an EV charging software stack. Prior to version 2025.9.0, once the validity of the received V2G message has been verified, it is checked whether the submitted session ID matches the registered one. [CVSS 4.3 MEDIUM]

Authentication Bypass Everest
NVD GitHub
CVSS 3.1
4.3
EPSS
0.0%
CVE-2025-68139 MEDIUM This Month

EVerest is an EV charging software stack. In all versions up to and including 2025.12.1, the default value for `terminate_connection_on_failed_response` is `False`, which leaves the responsibility for session and connection termination to the EV. [CVSS 4.3 MEDIUM]

Information Disclosure Everest
NVD GitHub
CVSS 3.1
4.3
EPSS
0.0%
CVE-2025-68137 HIGH POC This Week

EVerest is an EV charging software stack. Prior to version 2025.10.0, an integer overflow occurring in `SdpPacket::parse_header()` allows the current buffer length to be set to 7 after a complete header of size 8 has been read. [CVSS 8.3 HIGH]

Buffer Overflow Integer Overflow Everest
NVD GitHub
CVSS 3.1
8.3
EPSS
0.0%
CVE-2025-68136 HIGH POC This Week

EVerest is an EV charging software stack. Prior to version 2025.10.0, once the module receives a SDP request, it creates a whole new set of objects like `Session`, `IConnection` which open new TCP socket for the ISO15118-20 communications and registers callbacks for the created file descriptor, without closing and destroying the previous ones. Previous `Session` is not saved and the usage of an `unique_ptr` is lost, destroying connection data. Latter, if the used socket and therefore file des...

Null Pointer Dereference Everest
NVD GitHub
CVSS 3.1
7.4
EPSS
0.1%
CVE-2025-68135 MEDIUM POC This Month

EVerest is an EV charging software stack. Prior to version 2025.10.0, C++ exceptions are not properly handled for and by the `TbdController` loop, leading to its caller and itself to silently terminates. [CVSS 6.5 MEDIUM]

Denial Of Service Everest
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-68134 HIGH This Week

EVerest is an EV charging software stack. Prior to version 2025.10.0, the use of the `assert` function to handle errors frequently causes the module to crash. [CVSS 7.4 HIGH]

Denial Of Service Everest
NVD GitHub
CVSS 3.1
7.4
EPSS
0.1%
CVE-2025-68132 MEDIUM POC PATCH This Month

EVerest is an EV charging software stack. Prior to version 2025.12.0, `is_message_crc_correct` in the DZG_GSH01 powermeter SLIP parser reads `vec[vec.size()-1]` and `vec[vec.size()-2]` without checking that at least two bytes are present. [CVSS 4.6 MEDIUM]

Denial Of Service Everest
NVD GitHub
CVSS 3.1
4.6
EPSS
0.0%
CVE-2025-68133 HIGH POC PATCH This Week

EVerest is an EV charging software stack. In versions 2025.9.0 and below, an attacker can exhaust the operating system's memory and cause the module to terminate by initiating an unlimited number of TCP connections that never proceed to ISO 15118-2 communication. [CVSS 7.4 HIGH]

Tls Everest
NVD GitHub
CVSS 3.1
7.4
EPSS
0.0%
CVE-2026-24003
EPSS 0% CVSS 4.3
MEDIUM This Month

EVerest is an EV charging software stack. [CVSS 4.3 MEDIUM]

Authentication Bypass Everest
NVD GitHub
CVE-2026-23955
EPSS 0% CVSS 4.2
MEDIUM POC This Month

Everest EV charging software prior to version 2025.9.0 contains an improper pointer arithmetic flaw in error handling where integer values are concatenated to strings, allowing local operators with high privileges to read sensitive memory regions including heap and stack data. Public exploit code exists for this vulnerability. The flaw requires user interaction and is resolved in version 2025.9.0, though patches remain unavailable for affected earlier versions.

Information Disclosure Everest
NVD GitHub
CVE-2025-68141
EPSS 0% CVSS 7.4
HIGH POC This Week

EVerest is an EV charging software stack. Prior to version 2025.10.0, during the deserialization of a `DC_ChargeLoopRes` message that includes Receipt as well as TaxCosts, the vector `<DetailedTax>tax_costs` in the target `Receipt` structure is accessed out of bounds. [CVSS 7.4 HIGH]

Null Pointer Dereference Deserialization Everest
NVD GitHub
CVE-2025-68140
EPSS 0% CVSS 4.3
MEDIUM This Month

EVerest is an EV charging software stack. Prior to version 2025.9.0, once the validity of the received V2G message has been verified, it is checked whether the submitted session ID matches the registered one. [CVSS 4.3 MEDIUM]

Authentication Bypass Everest
NVD GitHub
CVE-2025-68139
EPSS 0% CVSS 4.3
MEDIUM This Month

EVerest is an EV charging software stack. In all versions up to and including 2025.12.1, the default value for `terminate_connection_on_failed_response` is `False`, which leaves the responsibility for session and connection termination to the EV. [CVSS 4.3 MEDIUM]

Information Disclosure Everest
NVD GitHub
CVE-2025-68137
EPSS 0% CVSS 8.3
HIGH POC This Week

EVerest is an EV charging software stack. Prior to version 2025.10.0, an integer overflow occurring in `SdpPacket::parse_header()` allows the current buffer length to be set to 7 after a complete header of size 8 has been read. [CVSS 8.3 HIGH]

Buffer Overflow Integer Overflow Everest
NVD GitHub
CVE-2025-68136
EPSS 0% CVSS 7.4
HIGH POC This Week

EVerest is an EV charging software stack. Prior to version 2025.10.0, once the module receives a SDP request, it creates a whole new set of objects like `Session`, `IConnection` which open new TCP socket for the ISO15118-20 communications and registers callbacks for the created file descriptor, without closing and destroying the previous ones. Previous `Session` is not saved and the usage of an `unique_ptr` is lost, destroying connection data. Latter, if the used socket and therefore file des...

Null Pointer Dereference Everest
NVD GitHub
CVE-2025-68135
EPSS 0% CVSS 6.5
MEDIUM POC This Month

EVerest is an EV charging software stack. Prior to version 2025.10.0, C++ exceptions are not properly handled for and by the `TbdController` loop, leading to its caller and itself to silently terminates. [CVSS 6.5 MEDIUM]

Denial Of Service Everest
NVD GitHub
CVE-2025-68134
EPSS 0% CVSS 7.4
HIGH This Week

EVerest is an EV charging software stack. Prior to version 2025.10.0, the use of the `assert` function to handle errors frequently causes the module to crash. [CVSS 7.4 HIGH]

Denial Of Service Everest
NVD GitHub
CVE-2025-68132
EPSS 0% CVSS 4.6
MEDIUM POC PATCH This Month

EVerest is an EV charging software stack. Prior to version 2025.12.0, `is_message_crc_correct` in the DZG_GSH01 powermeter SLIP parser reads `vec[vec.size()-1]` and `vec[vec.size()-2]` without checking that at least two bytes are present. [CVSS 4.6 MEDIUM]

Denial Of Service Everest
NVD GitHub
CVE-2025-68133
EPSS 0% CVSS 7.4
HIGH POC PATCH This Week

EVerest is an EV charging software stack. In versions 2025.9.0 and below, an attacker can exhaust the operating system's memory and cause the module to terminate by initiating an unlimited number of TCP connections that never proceed to ISO 15118-2 communication. [CVSS 7.4 HIGH]

Tls Everest
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy