Description
EVerest is an EV charging software stack. Prior to version 2025.12.0, `is_message_crc_correct` in the DZG_GSH01 powermeter SLIP parser reads `vec[vec.size()-1]` and `vec[vec.size()-2]` without checking that at least two bytes are present. Malformed SLIP frames on the serial link can reach `is_message_crc_correct` with `vec.size() < 2` (only via the multi-message path), causing an out-of-bounds read before CRC verification and `pop_back` underflow. Therefore, an attacker controlling the serial input can reliably crash the process. Version 2025.12.0 fixes the issue.
INFO
Published Date :
2026-01-21T18:28:40.763Z
Last Modified :
2026-01-21T19:06:48.136Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2025-68132 vulnerability.
| Vendors | Products |
|---|---|
| Everest |
|
| Linuxfoundation |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-68132.