Ev2go.Io

4 CVEs product

Monthly

CVE-2026-25945 HIGH This Week

Ev2go.Io's WebSocket API lacks authentication rate limiting, enabling attackers to launch denial-of-service attacks that disrupt charger telemetry or conduct brute-force attacks to compromise user accounts. The vulnerability affects all users of the platform and currently has no available patch. With a CVSS score of 7.5 and low exploit prevalence, this represents a significant availability and authentication risk requiring immediate mitigation.

Authentication Bypass Ev2go.Io
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-24731 CRITICAL Act Now

Missing WebSocket authentication vulnerability identical to CVE-2026-20781. Unauthenticated attackers can perform station impersonation and data injection via unprotected WebSocket endpoints.

Authentication Bypass Ev2go.Io
NVD GitHub
CVSS 3.1
9.4
EPSS
0.1%
CVE-2026-22890 MEDIUM This Month

Ev2go.Io charging stations expose authentication credentials through publicly accessible web-based mapping platforms, allowing unauthenticated remote attackers to obtain sensitive identification data. This exposure could enable unauthorized access to charging infrastructure or facilitate further attacks against connected systems. No patch is currently available for this vulnerability.

Authentication Bypass Ev2go.Io
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-20895 HIGH This Week

Session hijacking in Ev2go.Io's WebSocket backend allows remote attackers to impersonate legitimate charging stations and intercept commands due to predictable session identifiers and insufficient endpoint validation. An unauthenticated attacker can establish multiple connections with the same session ID to displace legitimate stations, potentially gaining unauthorized access to charging infrastructure or disrupting service availability. No patch is currently available.

Authentication Bypass Ev2go.Io
NVD GitHub
CVSS 3.1
7.3
EPSS
0.0%
CVE-2026-25945
EPSS 0% CVSS 7.5
HIGH This Week

Ev2go.Io's WebSocket API lacks authentication rate limiting, enabling attackers to launch denial-of-service attacks that disrupt charger telemetry or conduct brute-force attacks to compromise user accounts. The vulnerability affects all users of the platform and currently has no available patch. With a CVSS score of 7.5 and low exploit prevalence, this represents a significant availability and authentication risk requiring immediate mitigation.

Authentication Bypass Ev2go.Io
NVD GitHub
CVE-2026-24731
EPSS 0% CVSS 9.4
CRITICAL Act Now

Missing WebSocket authentication vulnerability identical to CVE-2026-20781. Unauthenticated attackers can perform station impersonation and data injection via unprotected WebSocket endpoints.

Authentication Bypass Ev2go.Io
NVD GitHub
CVE-2026-22890
EPSS 0% CVSS 6.5
MEDIUM This Month

Ev2go.Io charging stations expose authentication credentials through publicly accessible web-based mapping platforms, allowing unauthenticated remote attackers to obtain sensitive identification data. This exposure could enable unauthorized access to charging infrastructure or facilitate further attacks against connected systems. No patch is currently available for this vulnerability.

Authentication Bypass Ev2go.Io
NVD GitHub
CVE-2026-20895
EPSS 0% CVSS 7.3
HIGH This Week

Session hijacking in Ev2go.Io's WebSocket backend allows remote attackers to impersonate legitimate charging stations and intercept commands due to predictable session identifiers and insufficient endpoint validation. An unauthenticated attacker can establish multiple connections with the same session ID to displace legitimate stations, potentially gaining unauthorized access to charging infrastructure or disrupting service availability. No patch is currently available.

Authentication Bypass Ev2go.Io
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy