Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 31 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linuxfoundation
Linuxfoundation everest |
|
| CPEs | cpe:2.3:o:linuxfoundation:everest:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Linuxfoundation
Linuxfoundation everest |
|
| Metrics |
cvssV3_1
|
Sat, 28 Mar 2026 04:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 27 Mar 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Everest
Everest everest-core |
|
| Vendors & Products |
Everest
Everest everest-core |
Thu, 26 Mar 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | EVerest is an EV charging software stack. Prior to versions to 2026.02.0, ISO15118_chargerImpl::handle_session_setup copies a variable-length payment_options list into a fixed-size array of length 2 without bounds checking. With schema validation disabled by default, oversized MQTT Cmd payloads can trigger out-of-bounds writes and corrupt adjacent EVSE state or crash the process. Version 2026.02.0 contains a patch. | |
| Title | EVerest: ISO15118 session_setup payment options overflow can corrupt EVSE state | |
| Weaknesses | CWE-787 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-28T02:25:02.011Z
Reserved: 2026-02-24T02:31:33.268Z
Link: CVE-2026-27815
Updated: 2026-03-28T02:24:57.797Z
Status : Analyzed
Published: 2026-03-26T17:16:34.063
Modified: 2026-03-31T15:04:28.107
Link: CVE-2026-27815
No data.
OpenCVE Enrichment
Updated: 2026-03-31T20:08:52Z