<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-22790 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-22790/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 26 Mar 2026 15:16:31 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-22790/feed.xml" rel="self" type="application/rss+xml"/><item><title>EVerest EV Charging Stack Remote Code Execution via Stack Buffer Overflow (CVE-2026-22790)</title><link>https://feed.craftedsignal.io/briefs/2026-03-everest-rce/</link><pubDate>Thu, 26 Mar 2026 15:16:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-everest-rce/</guid><description>EVerest versions before 2026.02.0 are vulnerable to a stack-based buffer overflow (CVE-2026-22790) in the `HomeplugMessage::setup_payload` function, enabling remote code execution via network frames with oversized SLAC payloads.</description><content:encoded><![CDATA[<p>EVerest is an open-source software stack designed for managing EV charging infrastructure. Prior to version 2026.02.0, a critical vulnerability exists within the <code>HomeplugMessage::setup_payload</code> function. Specifically, the code trusts the <code>len</code> parameter after an <code>assert</code> statement during the processing of SLAC (Signal Level Attenuation Characterization) payloads. In release builds, the <code>assert</code> check is removed, which allows an attacker to send network frames with oversized SLAC payloads. This…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>everest</category><category>rce</category><category>buffer-overflow</category><category>cve-2026-22790</category></item></channel></rss>