Impact
The vulnerability is an unsynchronized access race in the EvseManager phase‑switch path, which can cause undefined behavior when an AC phase switch request is issued while charging. This race condition can lead to inconsistent shared state, resulting in a crash or unpredictable operation of the charging controller, effectively denying service to EV users.
Affected Systems
EVerest everest-core, all releases prior to 2026.02.0 are affected. The issue is found in the EV charging software stack maintained by the Linux Foundation.
Risk and Exploitability
CVSS score is 4.2, reflecting moderate potential impact, and the EPSS score is below 1%, indicating low likelihood of exploitation. It is not listed in the CISA KEV catalog. The attack vector is inferred to be local or remote via the EVSE command interface that can trigger the phase‑switch request while the state machine loop is active, thereby inducing the race.
OpenCVE Enrichment