


Perceptive Security
SOC/SIEM Consultancy

EVerest is an EV charging software stack. Prior to version 2025.10.0, an integer overflow occurring in `SdpPacket::parse_header()` allows the current buffer len…
Published:
20 January 2026 at 23:00:00
Alert date:
21 January 2026 at 21:03:00
Source:
nvd.nist.gov
Critical Infrastructure, Mobile & IoT
CVE-2025-68137 affects EVerest EV charging software stack prior to version 2025.10.0. An integer overflow in SdpPacket::parse_header() allows buffer length manipulation, causing negative values to be interpreted as SIZE_MAX. This leads to either infinite loops or stack buffer overflows depending on TCP or TLS server configuration. The vulnerability has been fixed in version 2025.10.0.
Technical details
Mitigation steps:
Affected products:
EVerest
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2025-68137
https://github.com/EVerest/everest-core/security/advisories/GHSA-7qq4-q9r8-wc7w
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
