Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-27815— EVerest: ISO15118 session_setup payment options overflow can corrupt EVSE state

EPSS 0.04% · P14
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-27815

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
EVerest: ISO15118 session_setup payment options overflow can corrupt EVSE state
Source: NVD (National Vulnerability Database)
Vulnerability Description
EVerest is an EV charging software stack. Prior to versions to 2026.02.0, ISO15118_chargerImpl::handle_session_setup copies a variable-length payment_options list into a fixed-size array of length 2 without bounds checking. With schema validation disabled by default, oversized MQTT Cmd payloads can trigger out-of-bounds writes and corrupt adjacent EVSE state or crash the process. Version 2026.02.0 contains a patch.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
跨界内存写
Source: NVD (National Vulnerability Database)
Vulnerability Title
EVerest 缓冲区错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
EVerest是EVerest开源的一个电动汽车充电桩的固件。 EVerest 2026.02.0之前版本存在缓冲区错误漏洞,该漏洞源于ISO15118_chargerImpl::handle_session_setup函数将可变长度列表复制到固定大小数组时未进行边界检查,可能导致越界写入、损坏相邻状态或进程崩溃。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
EVeresteverest-core < 2026.02.0 -

II. Public POCs for CVE-2026-27815

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-27815

登录查看更多情报信息。

Same Patch Batch · EVerest · 2026-03-26 · 18 CVEs total

CVE-2026-227908.8 HIGHEVerest's unchecked SLAC payload length causes stack overflow in HomeplugMessage::setup_pa
CVE-2026-225938.4 HIGHEVerest has off-by-one stack buffer overflow in IsoMux certificate filename parsing
CVE-2026-239958.4 HIGHEVerest has stack buffer overflow in ifreq.ifr_name when interface name exceeds IFNAMSIZ
CVE-2026-330098.2 HIGHEVerest: MQTT Switch-Phases Command Data Race Causing Charger State Corruptio
CVE-2026-260087.5 HIGHEVerest has OOB via EVSE ID Indexing Mismatch in OCPP 2.0.1 UpdateAllowedEnergyTransferMod
CVE-2026-260747.0 HIGHEVerest: OCPP201 startup event_queue lock mismatch leads to std::map/std::queue data race
CVE-2026-260735.9 MEDIUMEVerest: OCPP 1.6 heap corruption caused by lock-free insertion in event_queue
CVE-2026-278135.3 MEDIUMEVerest has use-after-free in auth timeout timer via race condition
CVE-2026-330155.2 MEDIUMEVerest has RemoteStop Bypass via BCB Toggle Session Restart
CVE-2026-330145.2 MEDIUMEVerest has Delayed Authorization Response Bypasses Termination After RemoteStop
CVE-2026-290445.0 MEDIUMEVerest: Charging Continues When WithdrawAuthorization Is Processed Before TransactionStar
CVE-2026-260704.6 MEDIUMEVerest: OCPP 2.0.1 EV SoC Update Race Causes Charge Point Crash
CVE-2026-278144.2 MEDIUMEVerest EvseManager phase-switch path has unsynchronized shared-state access race conditio
CVE-2026-260714.2 MEDIUMEVerest: OCPP 2.0.1 EVCCID Data Race Leads to Heap Use‑After‑Free
CVE-2026-260724.2 MEDIUMEVerest has race-condition-induced std::map corruption in OCPP 1.6 evse_soc_map
CVE-2026-27816EVerest's ISO15118 update_energy_transfer_modes overflow can corrupt EVSE state
CVE-2026-27828EVerest: ISO15118 session_setup use-after-free can crash EVSE process

IV. Related Vulnerabilities

V. Comments for CVE-2026-27815

No comments yet


Leave a comment