Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 22 Jan 2026 04:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 22 Jan 2026 03:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | EVerest is an EV charging software stack. Prior to version 2025.12.0, `is_message_crc_correct` in the DZG_GSH01 powermeter SLIP parser reads `vec[vec.size()-1]` and `vec[vec.size()-2]` without checking that at least two bytes are present. Malformed SLIP frames on the serial link can reach `is_message_crc_correct` with `vec.size() < 2` (only via the multi-message path), causing an out-of-bounds read before CRC verification and `pop_back` underflow. Therefore, an attacker controlling the serial input can reliably crash the process. Version 2025.12.0 fixes the issue. | |
| Title | EVerest has out-of-bounds read in DZG_GSH01 SLIP CRC parser that can crash powermeter driver | |
| Weaknesses | CWE-125 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-21T19:06:48.136Z
Reserved: 2025-12-15T18:05:52.211Z
Link: CVE-2025-68132
Updated: 2026-01-21T19:06:38.841Z
Status : Received
Published: 2026-01-21T19:16:04.343
Modified: 2026-01-21T19:16:04.343
Link: CVE-2025-68132
No data.
OpenCVE Enrichment
No data.