Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| EVerest | everest-core | < 2025.10.0 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2025-68137 | 8.4 HIGH | EVerest's Integer Overflow and Signed to Unsigned conversion lead to either stack buffer o |
| CVE-2025-68133 | 7.4 HIGH | EVerest's unlimited connections can lead to DoS through operating system resource exhausti |
| CVE-2025-68134 | 7.4 HIGH | EVerest's use of assert functions can potentially lead to denial of service |
| CVE-2025-68136 | 7.4 HIGH | EVerest's inadequate session handling can lead to memory-related errors or exhaustion of t |
| CVE-2025-68141 | 7.4 HIGH | EVerest vulnerable to null pointer dereference during DC_ChargeLoopRes document deserializ |
| CVE-2025-68138 | 4.7 MEDIUM | EVerest affected by memory exhaustion in libocpp |
| CVE-2025-68139 | 4.3 MEDIUM | In EVerest, by default, the EV is responsible for closing the connection if the module enc |
| CVE-2025-68140 | 4.3 MEDIUM | EVerest allows null session ID to bypass session ID verification |
| CVE-2026-23955 | 4.2 MEDIUM | EVerest vulnerable to concatenation of strings literal and integers |
| CVE-2025-68132 | EVerest has out-of-bounds read in DZG_GSH01 SLIP CRC parser that can crash powermeter driv |
No comments yet