Ad

CVE-2026-22593

HIGH CVSS 3.1: 7.8 EPSS 0.01%
Updated Mar 31, 2026
Everest
Parameter Value
CVSS 7.8 (HIGH)
Affected Versions before 2026.02.0
Fixed In 2026.02.0
Type CWE-193
Vendor Everest
Public PoC No

EVerest is an EV charging software stack. Prior to version 2026.02.0, an off-by-one check in IsoMux certificate filename handling causes a stack-based buffer overflow when a filename length equals `MAX_FILE_NAME_LENGTH` (100). A crafted filename in the certificate directory can overflow `file_names[idx]`, corrupting stack state and enabling potential code execution.

Version 2026.02.0 contains a patch.

Attack Parameters

Attack Vector
Local
Requires local access
Attack Complexity
Low
Easy to exploit
Privileges Required
Low
Basic privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
High
Complete data modification
Availability
High
Complete denial of service

CVSS Vector v3.1

Weakness Type (CWE)

Vulnerable Products 1

Configuration From (including) Up to (excluding)
Linuxfoundation Everest
cpe:2.3:o:linuxfoundation:everest:*:*:*:*:*:*:*:*
2026.02.0