Impact
The vulnerability arises from an unchecked length check for SLAC payloads in the HomeplugMessage::setup_payload function within the EVerest EV charging software stack. Because the length assertion is removed in release builds, large payloads are copied into a 1497‑byte stack buffer, causing a stack overflow that can be exploited via a crafted network frame to achieve remote code execution on the host system.
Affected Systems
The affected component is EVerest’s everest‑core module, specifically any deployment using a version older than 2026.02.0. Systems running these versions are vulnerable regardless of other configuration settings.
Risk and Exploitability
The CVSS score of 8.8 indicates high severity, while the EPSS score below 1% suggests a low current probability of exploitation. The vulnerability is not listed in CISA’s KEV catalog. Attacks would require sending a specially crafted network frame containing an oversized SLAC payload, a scenario plausible in uncontrolled network environments.
OpenCVE Enrichment