


Perceptive Security
SOC/SIEM Consultancy

EVerest is an EV charging software stack. Prior to version 2026.02.0, stack-based buffer overflow in CAN interface initialization: passing an interface name lon…
Published:
25 maart 2026 om 23:00:00
Alert date:
26 maart 2026 om 16:11:29
Source:
nvd.nist.gov
Mobile & IoT, Critical Infrastructure
EVerest, an electric vehicle charging software stack, contains a critical stack-based buffer overflow vulnerability in its CAN interface initialization code. The vulnerability occurs when an interface name longer than IFNAMSIZ (16 characters) is passed to CAN open routines, causing an overflow of the ifreq.ifr_name buffer. This corruption of adjacent stack data can potentially enable code execution. The vulnerability can be triggered by a malicious or misconfigured interface name before any privilege checks are performed. All versions prior to 2026.02.0 are affected, and a patch is available in version 2026.02.0.
Technical details
Mitigation steps:
Affected products:
EVerest
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-23995
https://github.com/EVerest/EVerest/security/advisories/GHSA-p47c-2jpr-mpwx
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
