Description

EVerest is an EV charging software stack. In all versions up to and including 2025.12.1, the default value for `terminate_connection_on_failed_response` is `False`, which leaves the responsibility for session and connection termination to the EV. In this configuration, any errors encountered by the module are logged but do not trigger countermeasures such as session and connection reset or termination. This could be abused by a malicious user in order to exploit other weaknesses or vulnerabilities. While the default will stay at the setting that is described as potentially problematic in this reported issue, a mitigation is available by changing the `terminate_connection_on_failed_response` setting to `true`. However this cannot be set to this value by default since it can trigger errors in vehicle ECUs requiring ECU resets and lengthy unavailability in charging for vehicles. The maintainers judge this to be a much more important workaround then short-term unavailability of an EVSE, therefore this setting will stay at the current value.

INFO

Published Date :

2026-01-21T19:36:36.127Z

Last Modified :

2026-01-22T16:50:50.152Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2025-68139 vulnerability.

Vendors Products
Everest
  • Everest-core
Linuxfoundation
  • Everest
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-68139.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact