<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Everest — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/everest/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 27 Mar 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/everest/feed.xml" rel="self" type="application/rss+xml"/><item><title>EVerest CAN Interface Stack Buffer Overflow Vulnerability (CVE-2026-23995)</title><link>https://feed.craftedsignal.io/briefs/2026-03-everest-can-overflow/</link><pubDate>Fri, 27 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-everest-can-overflow/</guid><description>A stack-based buffer overflow vulnerability exists in EVerest EV charging software stack versions prior to 2026.02.0. Passing an interface name longer than 16 characters to CAN open routines overflows `ifreq.ifr_name`, potentially leading to code execution.</description><content:encoded>&lt;p>EVerest is an open-source software stack for electric vehicle (EV) charging infrastructure. A stack-based buffer overflow vulnerability, tracked as CVE-2026-23995, affects versions prior to 2026.02.0. The vulnerability stems from improper handling of CAN (Controller Area Network) interface names during initialization. Specifically, when an interface name exceeding IFNAMSIZ (16 bytes) is supplied to CAN open routines, the &lt;code>ifreq.ifr_name&lt;/code> buffer overflows, potentially corrupting adjacent stack…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>everest</category><category>buffer-overflow</category><category>cve-2026-23995</category><category>ev-charging</category></item><item><title>EVerest EV Charging Stack Data Race Vulnerability (CVE-2026-26074)</title><link>https://feed.craftedsignal.io/briefs/2026-03-everest-data-race/</link><pubDate>Thu, 26 Mar 2026 17:16:33 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-everest-data-race/</guid><description>EVerest versions prior to 2026.02.0 exhibit a data race vulnerability (CVE-2026-26074) where concurrent network requests and physical events can corrupt the event queue, leading to potential denial of service or other undefined behavior.</description><content:encoded><![CDATA[<p>EVerest, an EV charging software stack, is susceptible to a data race vulnerability identified as CVE-2026-26074. This flaw affects versions prior to 2026.02.0. The vulnerability arises from concurrent access to the <code>event_queue</code>, specifically a <code>std::map&lt;std::queue&gt;</code>, when a CSMS (Charging Station Management System) GetLog or UpdateFirmware request (originating from the network) coincides with an EVSE (Electric Vehicle Supply Equipment) fault event (a physical occurrence). This combination of…</p>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve-2026-26074</category><category>data-race</category><category>ev-charging</category><category>everest</category></item><item><title>EVerest EV Charging Stack Remote Code Execution via Stack Buffer Overflow (CVE-2026-22790)</title><link>https://feed.craftedsignal.io/briefs/2026-03-everest-rce/</link><pubDate>Thu, 26 Mar 2026 15:16:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-everest-rce/</guid><description>EVerest versions before 2026.02.0 are vulnerable to a stack-based buffer overflow (CVE-2026-22790) in the `HomeplugMessage::setup_payload` function, enabling remote code execution via network frames with oversized SLAC payloads.</description><content:encoded><![CDATA[<p>EVerest is an open-source software stack designed for managing EV charging infrastructure. Prior to version 2026.02.0, a critical vulnerability exists within the <code>HomeplugMessage::setup_payload</code> function. Specifically, the code trusts the <code>len</code> parameter after an <code>assert</code> statement during the processing of SLAC (Signal Level Attenuation Characterization) payloads. In release builds, the <code>assert</code> check is removed, which allows an attacker to send network frames with oversized SLAC payloads. This…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>everest</category><category>rce</category><category>buffer-overflow</category><category>cve-2026-22790</category></item></channel></rss>