Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 31 Mar 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linuxfoundation
Linuxfoundation everest |
|
| CPEs | cpe:2.3:o:linuxfoundation:everest:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Linuxfoundation
Linuxfoundation everest |
Sat, 28 Mar 2026 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 27 Mar 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Everest
Everest everest-core |
|
| Vendors & Products |
Everest
Everest everest-core |
Thu, 26 Mar 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | EVerest is an EV charging software stack. Prior to version 2026.02.0, an off-by-one check in IsoMux certificate filename handling causes a stack-based buffer overflow when a filename length equals `MAX_FILE_NAME_LENGTH` (100). A crafted filename in the certificate directory can overflow `file_names[idx]`, corrupting stack state and enabling potential code execution. Version 2026.02.0 contains a patch. | |
| Title | EVerest has off-by-one stack buffer overflow in IsoMux certificate filename parsing | |
| Weaknesses | CWE-193 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-28T02:20:37.830Z
Reserved: 2026-01-07T21:50:39.532Z
Link: CVE-2026-22593
Updated: 2026-03-28T02:20:33.372Z
Status : Analyzed
Published: 2026-03-26T15:16:31.800
Modified: 2026-03-31T13:51:21.627
Link: CVE-2026-22593
No data.
OpenCVE Enrichment
Updated: 2026-03-31T20:09:05Z