Linuxfoundation

Everest

29 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Veröffentlicht 26.03.2026 16:15:22
  • Zuletzt bearbeitet 30.03.2026 21:04:21

EVerest is an EV charging software stack. Versions prior to 2026.02.0 have a data race leading to possible `std::queue`/`std::deque` corruption. The trigger is powermeter public key update and EV session/error events (while OCPP not started). This re...

  • EPSS 0.02%
  • Veröffentlicht 26.03.2026 15:16:33
  • Zuletzt bearbeitet 31.03.2026 13:06:06

EVerest is an EV charging software stack. Versions prior to 2026.02.0 have a data race leading to `std::map<std::optional>` concurrent access (container/optional corruption possible). The trigger is EV SoC update with powermeter periodic update and u...

  • EPSS 0.02%
  • Veröffentlicht 26.03.2026 15:16:32
  • Zuletzt bearbeitet 31.03.2026 13:06:47

EVerest is an EV charging software stack. Versions prior to 2026.02.0 have a data race leading to `std::string` concurrent access. with heap-use-after-free possible. This is triggered by EVCCID update (EV/ISO15118) and OCPP session/authorization even...

  • EPSS 0.02%
  • Veröffentlicht 26.03.2026 14:45:36
  • Zuletzt bearbeitet 31.03.2026 13:07:31

EVerest is an EV charging software stack. Versions prior to 2026.02.0 have a data race leading to `std::map<std::optional>` concurrent access (container/optional corruption possible). The trigger is an EV SoC update with powermeter periodic update an...

  • EPSS 0.06%
  • Veröffentlicht 26.03.2026 14:43:41
  • Zuletzt bearbeitet 31.03.2026 13:45:52

EVerest is an EV charging software stack. Versions prior to 2026.02.0 have an out-of-bounds access (std::vector) that leads to possible remote crash/memory corruption. This is because the CSMS sends UpdateAllowedEnergyTransferModes over the network. ...

Exploit
  • EPSS 0.01%
  • Veröffentlicht 26.03.2026 14:36:30
  • Zuletzt bearbeitet 31.03.2026 13:49:39

EVerest is an EV charging software stack. Prior to version 2026.02.0, stack-based buffer overflow in CAN interface initialization: passing an interface name longer than IFNAMSIZ (16) to CAN open routines overflows `ifreq.ifr_name`, corrupting adjacen...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 26.03.2026 14:31:44
  • Zuletzt bearbeitet 31.03.2026 13:50:31

EVerest is an EV charging software stack. Prior to version 2026.02.0, `HomeplugMessage::setup_payload` trusts `len` after an `assert`; in release builds the check is removed, so oversized SLAC payloads are `memcpy`'d into a ~1497-byte stack buffer, c...

Exploit
  • EPSS 0.01%
  • Veröffentlicht 26.03.2026 13:49:26
  • Zuletzt bearbeitet 31.03.2026 13:51:21

EVerest is an EV charging software stack. Prior to version 2026.02.0, an off-by-one check in IsoMux certificate filename handling causes a stack-based buffer overflow when a filename length equals `MAX_FILE_NAME_LENGTH` (100). A crafted filename in t...

  • EPSS 0.24%
  • Veröffentlicht 26.01.2026 22:12:47
  • Zuletzt bearbeitet 17.02.2026 20:48:01

EVerest is an EV charging software stack. In versions up to and including 2025.12.1, it is possible to bypass the sequence state verification including authentication, and send requests that transition to forbidden states relative to the current one,...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 21.01.2026 20:16:06
  • Zuletzt bearbeitet 06.02.2026 21:22:03

EVerest is an EV charging software stack. Prior to version 2025.10.0, during the deserialization of a `DC_ChargeLoopRes` message that includes Receipt as well as TaxCosts, the vector `<DetailedTax>tax_costs` in the target `Receipt` structure is acces...