Impact
EVerest, an EV charging software stack, has a flaw that permits reading beyond the bounds of a std::vector when the Charge Station Management System sends the UpdateAllowedEnergyTransferModes message in OCPP 2.0.1. This out‑of‑bounds access can corrupt memory or cause the application to crash, leading to loss of availability and potential integrity compromise of the charging control software.
Affected Systems
The vulnerability affects deployments of the EVerest everest‑core package on Linux running any release prior to 2026.02.0. Versions 2026.02.0 and newer contain the patch that resolves the indexing mismatch.
Risk and Exploitability
The CVSS score of 7.5 signifies moderate‑to‑high severity, yet the EPSS score of less than 1% indicates a very low current likelihood of exploitation. The issue is not listed in CISA’s KEV catalog. Based on the description, the likely attack vector is remote: an adversary with control over a Charge Station Management System can send the UpdateAllowedEnergyTransferModes command to trigger the flaw, inferring a network‑based exploitation route.
OpenCVE Enrichment