CVE-2025-68137

8.3 HIGH

📋 TL;DR

An integer overflow vulnerability in EVerest EV charging software allows attackers to trigger either infinite loops or stack buffer overflows by sending specially crafted packets. This affects all EVerest installations prior to version 2025.10.0, potentially disrupting charging operations or enabling remote code execution.

💻 Affected Systems

Products:
  • EVerest EV charging software stack
Versions: All versions prior to 2025.10.0
Operating Systems: Any OS running EVerest
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both TCP and TLS configurations, with TLS leading to buffer overflow and TCP leading to infinite loop.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, service disruption of EV charging infrastructure, or data exfiltration from charging management systems.

🟠

Likely Case

Service disruption through denial of service (infinite loop) or potential remote code execution via buffer overflow, compromising charging station availability.

🟢

If Mitigated

Limited impact if network segmentation prevents external access, but internal systems could still be affected by malicious internal actors.

🌐 Internet-Facing: HIGH - Directly exploitable over network without authentication, affecting internet-connected charging infrastructure.
🏢 Internal Only: HIGH - Even internally, the vulnerability can be exploited by any network-connected device to disrupt charging operations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting specific network packets but doesn't require authentication. The advisory provides technical details that could aid exploit development.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2025.10.0

Vendor Advisory: https://github.com/EVerest/everest-core/security/advisories/GHSA-7qq4-q9r8-wc7w

Restart Required: Yes

Instructions:

1. Update EVerest to version 2025.10.0 or later. 2. Restart all EVerest services. 3. Verify the update was successful by checking the version.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate EVerest systems from untrusted networks to prevent external exploitation.

Firewall Rules

linux

Restrict network access to EVerest services to only trusted IP addresses.

iptables -A INPUT -p tcp --dport [EVEREST_PORT] -s [TRUSTED_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [EVEREST_PORT] -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate EVerest systems from untrusted networks.
  • Deploy intrusion detection systems to monitor for exploitation attempts and anomalous traffic patterns.

🔍 How to Verify

Check if Vulnerable:

Check EVerest version - if below 2025.10.0, the system is vulnerable.

Check Version:

Check EVerest configuration files or use 'everest --version' if available.

Verify Fix Applied:

Confirm EVerest version is 2025.10.0 or higher and test charging functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual network connection attempts to EVerest ports
  • Service crashes or restarts
  • High CPU usage from EVerest processes

Network Indicators:

  • Malformed packets to EVerest ports
  • Unexpected traffic patterns to charging infrastructure

SIEM Query:

source="EVEREST" AND (event_type="crash" OR event_type="high_cpu") OR dest_port=[EVEREST_PORT] AND packet_size>normal

🔗 References

📤 Share & Export