Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-20748— Everon api.everon.io Insufficient Session Expiration

CVSS 7.3 · High EPSS 0.05% · P15
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-20748

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Everon api.everon.io Insufficient Session Expiration
Source: NVD (National Vulnerability Database)
Vulnerability Description
The WebSocket backend uses charging station identifiers to uniquely associate sessions but allows multiple endpoints to connect using the same session identifier. This implementation results in predictable session identifiers and enables session hijacking or shadowing, where the most recent connection displaces the legitimate charging station and receives backend commands intended for that station. This vulnerability may allow unauthorized users to authenticate as other users or enable a malicious actor to cause a denial-of-service condition by overwhelming the backend with valid session requests.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
不充分的会话过期机制
Source: NVD (National Vulnerability Database)
Vulnerability Title
Everon 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Everon是Everon公司的一个电动汽车充电站系统。 Everon存在代码问题漏洞,该漏洞源于WebSocket后端使用可预测的会话标识符,可能导致会话劫持或影子攻击,进而导致拒绝服务或未经授权的身份验证。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Everonapi.everon.io All versions -

II. Public POCs for CVE-2026-20748

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-20748

登录查看更多情报信息。

Same Patch Batch · Everon · 2026-03-06 · 4 CVEs total

CVE-2026-262889.4 CRITICALEveron api.everon.io Missing Authentication for Critical Function
CVE-2026-246967.5 HIGHEveron api.everon.io Improper Restriction of Excessive Authentication Attempts
CVE-2026-270276.5 MEDIUMEveron api.everon.io Insufficiently Protected Credentials

IV. Related Vulnerabilities

V. Comments for CVE-2026-20748

No comments yet


Leave a comment