### [CVE-2024-37310](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37310) ![](https://img.shields.io/static/v1?label=Product&message=everest-core&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%202024.3.1%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-122%3A%20Heap-based%20Buffer%20Overflow&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-190%3A%20Integer%20Overflow%20or%20Wraparound&color=brighgreen) ### Description EVerest is an EV charging software stack. An integer overflow in the "v2g_incoming_v2gtp" function in the v2g_server.cpp implementation can allow a remote attacker to overflow the process' heap. This vulnerability is fixed in 2024.3.1 and 2024.6.0. ### POC #### Reference - https://github.com/EVerest/everest-core/security/advisories/GHSA-8g9q-7qr9-vc96 #### Github No PoCs found on GitHub currently.