Ev.Energy

4 CVEs product

Monthly

CVE-2026-26290 HIGH This Week

Ev.Energy's WebSocket implementation accepts duplicate session identifiers from multiple endpoints, allowing attackers to hijack active charging station sessions through predictable identifier prediction. An unauthenticated remote attacker can impersonate legitimate stations to intercept commands, authenticate as other users, or disrupt service by flooding the backend with spoofed session requests. No patch is currently available.

Authentication Bypass Ev.Energy
NVD GitHub
CVSS 3.1
7.3
EPSS
0.0%
CVE-2026-25774 MEDIUM This Month

Ev.Energy charging stations expose authentication credentials through publicly accessible web-based mapping platforms, allowing unauthenticated remote attackers to obtain access identifiers. An attacker with these credentials could potentially intercept or manipulate charging sessions and related data. No patch is currently available for this exposure.

Authentication Bypass Ev.Energy
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-24445 HIGH This Week

Ev.Energy's WebSocket API fails to implement rate limiting on authentication attempts, enabling attackers to launch denial-of-service attacks against charger telemetry systems or conduct brute-force credential attacks without restriction. This vulnerability affects all unauthenticated network-based interactions with the affected application and has no available patch at this time.

Authentication Bypass Ev.Energy
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-27772 CRITICAL Act Now

Missing WebSocket authentication — fifth CVE in the industrial platform WebSocket family. Same CWE-306 pattern enabling unauthenticated access and station impersonation.

Authentication Bypass Ev.Energy
NVD GitHub
CVSS 3.1
9.4
EPSS
0.1%
CVE-2026-26290
EPSS 0% CVSS 7.3
HIGH This Week

Ev.Energy's WebSocket implementation accepts duplicate session identifiers from multiple endpoints, allowing attackers to hijack active charging station sessions through predictable identifier prediction. An unauthenticated remote attacker can impersonate legitimate stations to intercept commands, authenticate as other users, or disrupt service by flooding the backend with spoofed session requests. No patch is currently available.

Authentication Bypass Ev.Energy
NVD GitHub
CVE-2026-25774
EPSS 0% CVSS 6.5
MEDIUM This Month

Ev.Energy charging stations expose authentication credentials through publicly accessible web-based mapping platforms, allowing unauthenticated remote attackers to obtain access identifiers. An attacker with these credentials could potentially intercept or manipulate charging sessions and related data. No patch is currently available for this exposure.

Authentication Bypass Ev.Energy
NVD GitHub
CVE-2026-24445
EPSS 0% CVSS 7.5
HIGH This Week

Ev.Energy's WebSocket API fails to implement rate limiting on authentication attempts, enabling attackers to launch denial-of-service attacks against charger telemetry systems or conduct brute-force credential attacks without restriction. This vulnerability affects all unauthenticated network-based interactions with the affected application and has no available patch at this time.

Authentication Bypass Ev.Energy
NVD GitHub
CVE-2026-27772
EPSS 0% CVSS 9.4
CRITICAL Act Now

Missing WebSocket authentication — fifth CVE in the industrial platform WebSocket family. Same CWE-306 pattern enabling unauthenticated access and station impersonation.

Authentication Bypass Ev.Energy
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy