Description
ChargePoint Home Flex revssh Service Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of ChargePoint Home Flex devices. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the handling of OCPP messages. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-26338.
Published: 2026-04-11
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Chargepoint home Flex Cph50
Chargepoint home Flex Cph50 Firmware
CPEs cpe:2.3:h:chargepoint:home_flex_cph50:-:*:*:*:*:*:*:*
cpe:2.3:o:chargepoint:home_flex_cph50_firmware:*:*:*:*:*:*:*:*
Vendors & Products Chargepoint home Flex Cph50
Chargepoint home Flex Cph50 Firmware

Mon, 13 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Chargepoint
Chargepoint home Flex
Vendors & Products Chargepoint
Chargepoint home Flex

Sat, 11 Apr 2026 01:00:00 +0000

Type Values Removed Values Added
Description ChargePoint Home Flex revssh Service Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of ChargePoint Home Flex devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of OCPP messages. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-26338.
Title ChargePoint Home Flex revssh Service Command Injection Remote Code Execution Vulnerability
Weaknesses CWE-78
References
Metrics cvssV3_0

{'score': 7.5, 'vector': 'CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Chargepoint Home Flex Home Flex Cph50 Home Flex Cph50 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published:

Updated: 2026-04-13T17:39:00.899Z

Reserved: 2026-03-13T20:34:14.213Z

Link: CVE-2026-4157

cve-icon Vulnrichment

Updated: 2026-04-13T17:38:57.174Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-11T01:16:17.487

Modified: 2026-04-27T17:42:41.327

Link: CVE-2026-4157

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T12:56:54Z

Weaknesses