Critical severity9.1NVD Advisory· Published Mar 26, 2026· Updated Mar 31, 2026
CVE-2026-27815
CVE-2026-27815
Description
EVerest is an EV charging software stack. Prior to versions to 2026.02.0, ISO15118_chargerImpl::handle_session_setup copies a variable-length payment_options list into a fixed-size array of length 2 without bounds checking. With schema validation disabled by default, oversized MQTT Cmd payloads can trigger out-of-bounds writes and corrupt adjacent EVSE state or crash the process. Version 2026.02.0 contains a patch.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- github.com/EVerest/EVerest/security/advisories/GHSA-7wmg-crc8-6xxfnvdMitigationVendor Advisory
News mentions
0No linked articles in our index yet.