Unrated severityOSV Advisory· Published Jan 21, 2026· Updated Jan 21, 2026
EVerest's inadequate session handling can lead to memory-related errors or exhaustion of the operating system’s file descriptors, resulting in a denial of service
CVE-2025-68136
Description
EVerest is an EV charging software stack. Prior to version 2025.10.0, once the module receives a SDP request, it creates a whole new set of objects like Session, IConnection which open new TCP socket for the ISO15118-20 communications and registers callbacks for the created file descriptor, without closing and destroying the previous ones. Previous Session is not saved and the usage of an unique_ptr is lost, destroying connection data. Latter, if the used socket and therefore file descriptor is not the last one, it will lead to a null pointer dereference. Version 2025.10.0 fixes the issue.
Affected products
1- Range: 2022.12.0, 2022.12.1, 2023.1.0, …
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- github.com/EVerest/everest-core/security/advisories/GHSA-4h8h-x5cp-g22rmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.