top of page
perceptive_background_267k.jpg

EVerest is an EV charging software stack. Prior to version 2026.02.0, stack-based buffer overflow in CAN interface initialization: passing an interface name lon…

Published:

25 maart 2026 om 23:00:00

Alert date:

26 maart 2026 om 16:11:29

Source:

nvd.nist.gov

Click to open the original link from this advisory

Mobile & IoT, Critical Infrastructure

EVerest, an electric vehicle charging software stack, contains a critical stack-based buffer overflow vulnerability in its CAN interface initialization code. The vulnerability occurs when an interface name longer than IFNAMSIZ (16 characters) is passed to CAN open routines, causing an overflow of the ifreq.ifr_name buffer. This corruption of adjacent stack data can potentially enable code execution. The vulnerability can be triggered by a malicious or misconfigured interface name before any privilege checks are performed. All versions prior to 2026.02.0 are affected, and a patch is available in version 2026.02.0.

Technical details

Mitigation steps:

Affected products:

EVerest

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page