Description
EVerest is an EV charging software stack. Prior to version 2026.02.0, stack-based buffer overflow in CAN interface initialization: passing an interface name longer than IFNAMSIZ (16) to CAN open routines overflows `ifreq.ifr_name`, corrupting adjacent stack data and enabling potential code execution. A malicious or misconfigured interface name can trigger this before any privilege checks. Version 2026.02.0 contains a patch.
Published: 2026-03-26
Score: 8.4 High
EPSS: < 1% Very Low
KEV: No
Impact: Potential code execution via buffer overflow
Action: Immediate Patch
AI Analysis

Impact

The bug is a stack-based buffer overflow in the CAN interface initialization routine of the EVerest core stack. When an interface name longer than the IFNAMSIZ constant (16 characters) is passed to the CAN open function, the ifreq.ifr_name field overflows and corrupts neighboring stack data, potentially allowing an attacker to overwrite return pointers or other control data. This flaw can lead to arbitrary code execution before any privilege checks, and is classified as CWE‑121.

Affected Systems

The vulnerability affects all releases of the EVerest everest‑core component before version 2026.02.0. Users running the EV charging software stack on Linux platforms that use these older versions are exposed. The problem resides in the CAN interface handling logic of the core package.

Risk and Exploitability

The CVSS score of 8.4 indicates high severity, yet the EPSS score is below 1%, implying low current exploitation probability. It is not listed in the CISA KEV catalog. Based on the description, the issue is exploitable by an adversary able to supply a malformed CAN interface name, which is likely achievable via local configuration or a misconfigured network interface that the software auto‑detects. Because the overflow occurs before privilege checks, the attacker could gain code execution with the privileges of the running EVerest process.

Generated by OpenCVE AI on March 31, 2026 at 16:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update EVerest everest-core to version 2026.02.0 or newer to apply the official patch.

Generated by OpenCVE AI on March 31, 2026 at 16:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 31 Mar 2026 14:00:00 +0000

Type Values Removed Values Added
First Time appeared Linuxfoundation
Linuxfoundation everest
CPEs cpe:2.3:o:linuxfoundation:everest:*:*:*:*:*:*:*:*
Vendors & Products Linuxfoundation
Linuxfoundation everest

Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Everest
Everest everest-core
Vendors & Products Everest
Everest everest-core

Thu, 26 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 15:00:00 +0000

Type Values Removed Values Added
Description EVerest is an EV charging software stack. Prior to version 2026.02.0, stack-based buffer overflow in CAN interface initialization: passing an interface name longer than IFNAMSIZ (16) to CAN open routines overflows `ifreq.ifr_name`, corrupting adjacent stack data and enabling potential code execution. A malicious or misconfigured interface name can trigger this before any privilege checks. Version 2026.02.0 contains a patch.
Title EVerest has stack buffer overflow in ifreq.ifr_name when interface name exceeds IFNAMSIZ
Weaknesses CWE-121
References
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Everest Everest-core
Linuxfoundation Everest
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-26T18:48:26.145Z

Reserved: 2026-01-19T18:49:20.658Z

Link: CVE-2026-23995

cve-icon Vulnrichment

Updated: 2026-03-26T18:48:22.737Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-26T15:16:32.137

Modified: 2026-03-31T13:49:39.677

Link: CVE-2026-23995

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-31T20:09:01Z

Weaknesses