Description
EVerest is an EV charging software stack. Prior to version 2026.02.0, an off-by-one check in IsoMux certificate filename handling causes a stack-based buffer overflow when a filename length equals `MAX_FILE_NAME_LENGTH` (100). A crafted filename in the certificate directory can overflow `file_names[idx]`, corrupting stack state and enabling potential code execution. Version 2026.02.0 contains a patch.
Published: 2026-03-26
Score: 8.4 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Patch Immediately
AI Analysis

Impact

EVerest is a software stack for electric vehicle charging. An off‑by‑one logic error in the IsoMux certificate filename parser allows a stack‑based buffer overflow when a certificate file name reaches the maximum allowed length of 100 characters. The overflow corrupts a stack variable named file_names[idx] and can overwrite nearby control flow data, giving an attacker the potential to execute arbitrary code on the affected device.

Affected Systems

The vulnerability affects the EVerest everest-core component in any release prior to 2026.02.0. Devices running this software on Linux, such as EV charging stations that use the everest-core stack, are susceptible because the flaw is present in the default certificate directory handling.

Risk and Exploitability

The CVSS score of 8.4 indicates high severity, while the EPSS score of less than 1% shows a low current exploitation probability. The issue is not listed in CISA’s KEV catalog. The likely exploitation path involves an attacker placing a specially crafted certificate file whose name is exactly 100 characters long in the certificate directory. This requires file system access—usually local—but could be achieved remotely if the device allows writing files to that directory. Once the file is in place, launching the EVerest stack can trigger the overflow, leading to code execution. Because the flaw is not yet widely exploited, current risk is moderate to high, but the impact of successful exploitation would be total compromise of the charging station.

Generated by OpenCVE AI on March 31, 2026 at 16:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update EVerest everest-core to version 2026.02.0 or a later release

Generated by OpenCVE AI on March 31, 2026 at 16:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 31 Mar 2026 14:00:00 +0000

Type Values Removed Values Added
First Time appeared Linuxfoundation
Linuxfoundation everest
CPEs cpe:2.3:o:linuxfoundation:everest:*:*:*:*:*:*:*:*
Vendors & Products Linuxfoundation
Linuxfoundation everest

Sat, 28 Mar 2026 03:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Everest
Everest everest-core
Vendors & Products Everest
Everest everest-core

Thu, 26 Mar 2026 14:30:00 +0000

Type Values Removed Values Added
Description EVerest is an EV charging software stack. Prior to version 2026.02.0, an off-by-one check in IsoMux certificate filename handling causes a stack-based buffer overflow when a filename length equals `MAX_FILE_NAME_LENGTH` (100). A crafted filename in the certificate directory can overflow `file_names[idx]`, corrupting stack state and enabling potential code execution. Version 2026.02.0 contains a patch.
Title EVerest has off-by-one stack buffer overflow in IsoMux certificate filename parsing
Weaknesses CWE-193
References
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Everest Everest-core
Linuxfoundation Everest
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-28T02:20:37.830Z

Reserved: 2026-01-07T21:50:39.532Z

Link: CVE-2026-22593

cve-icon Vulnrichment

Updated: 2026-03-28T02:20:33.372Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-26T15:16:31.800

Modified: 2026-03-31T13:51:21.627

Link: CVE-2026-22593

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-31T20:09:05Z

Weaknesses