Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Workaround
Everon shut down their platform on December 1st, 2025.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 06 May 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:everon:api.everon.io:-:*:*:*:*:*:*:* |
Tue, 10 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Everon
Everon api.everon.io |
|
| Vendors & Products |
Everon
Everon api.everon.io |
Fri, 06 Mar 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The WebSocket Application Programming Interface lacks restrictions on the number of authentication requests. This absence of rate limiting may allow an attacker to conduct denial-of-service attacks by suppressing or mis-routing legitimate charger telemetry, or conduct brute-force attacks to gain unauthorized access. | |
| Title | Everon api.everon.io Improper Restriction of Excessive Authentication Attempts | |
| Weaknesses | CWE-307 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2026-03-10T17:59:15.196Z
Reserved: 2026-02-25T15:28:27.129Z
Link: CVE-2026-24696
Updated: 2026-03-10T17:48:26.176Z
Status : Analyzed
Published: 2026-03-06T16:16:10.193
Modified: 2026-05-06T14:34:58.927
Link: CVE-2026-24696
No data.
OpenCVE Enrichment
Updated: 2026-04-16T11:30:15Z