CVE-2026-22790

EVerest is an EV charging software stack. Prior to version 2026.02.0, `HomeplugMessage::setup_payload` trusts `len` after an `assert`; in release builds the check is removed, so oversized SLAC payloads are `memcpy`'d into a ~1497-byte stack buffer, corrupting the stack and enabling remote code execution from network-provided frames. Version 2026.02.0 contains a patch.
Configurations

Configuration 1 (hide)

cpe:2.3:o:linuxfoundation:everest:*:*:*:*:*:*:*:*

History

31 Mar 2026, 13:50

Type Values Removed Values Added
CPE cpe:2.3:o:linuxfoundation:everest:*:*:*:*:*:*:*:*
References () https://github.com/EVerest/EVerest/security/advisories/GHSA-wh8w-7cfc-gq7m - () https://github.com/EVerest/EVerest/security/advisories/GHSA-wh8w-7cfc-gq7m - Exploit, Vendor Advisory
First Time Linuxfoundation
Linuxfoundation everest

30 Mar 2026, 13:26

Type Values Removed Values Added
Summary
  • (es) EVerest es una pila de software de carga de vehículos eléctricos. Antes de la versión 2026.02.0, 'HomeplugMessage::setup_payload' confía en 'len' después de un 'assert'; en las compilaciones de lanzamiento la verificación se elimina, por lo que las cargas útiles SLAC sobredimensionadas son 'memcpy'eadas en un búfer de pila de ~1497 bytes, corrompiendo la pila y permitiendo la ejecución remota de código desde tramas proporcionadas por la red. La versión 2026.02.0 contiene un parche.

26 Mar 2026, 16:16

Type Values Removed Values Added
References () https://github.com/EVerest/EVerest/security/advisories/GHSA-wh8w-7cfc-gq7m - () https://github.com/EVerest/EVerest/security/advisories/GHSA-wh8w-7cfc-gq7m -

26 Mar 2026, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-26 15:16

Updated : 2026-03-31 13:50


NVD link : CVE-2026-22790

Mitre link : CVE-2026-22790

CVE.ORG link : CVE-2026-22790


JSON object : View

Products Affected

linuxfoundation

  • everest
CWE
CWE-121

Stack-based Buffer Overflow