A vulnerability has been identified in OpenV2G (All versions < V0.9.6). The OpenV2G EXI parsing feature is missing a length check when parsing X509 serial numbers. Thus, an attacker could introduce a buffer overflow that leads to memory corruption.
References
Configurations
No configuration.
History
11 Feb 2025, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-11 11:15
Updated : 2025-02-11 11:15
NVD link : CVE-2025-24956
Mitre link : CVE-2025-24956
CVE.ORG link : CVE-2025-24956
JSON object : View
Products Affected
No product.
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')