Home

Description

EVerest is an EV charging software stack. In versions 2025.9.0 and below, an attacker can exhaust the operating system's memory and cause the module to terminate by initiating an unlimited number of TCP connections that never proceed to ISO 15118-2 communication. This is possible because a new thread is started for each incoming plain TCP or TLS socket connection before any verification occurs, and the verification performed is too permissive. The EVerest processes and all its modules shut down, affecting all EVSE functionality. This issue is fixed in version 2025.10.0.

PUBLISHED Reserved 2025-12-15 | Published 2026-01-21 | Updated 2026-01-21 | Assigner GitHub_M




HIGH: 7.4CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

Problem types

CWE-770: Allocation of Resources Without Limits or Throttling

Product status

< 2025.10.0
affected

References

github.com/...t-core/security/advisories/GHSA-mv3w-pp85-5h7c

github.com/...ommit/8127b8c54b296c4dd01b356ac26763f81f76a8fd

github.com/...ommit/de504f0c11069010d26767b0952739e9a400cef3

cve.org (CVE-2025-68133)

nvd.nist.gov (CVE-2025-68133)

Download JSON