Everon OCPP Backends
Everon OCPP backend (api.everon.io) contains multiple authentication and session management vulnerabilities (CWE-306: Missing Authentication, CWE-307: Improper Restriction of Rendered UI Layers, CWE-613: Insufficient Session Expiration, CWE-522: Insufficiently Protected Credentials). Successful exploitation could allow attackers to gain unauthorized administrative control over charging stations, disrupt charging services via denial-of-service, or manipulate charging sessions. Everon has shut down the platform as of December 1, 2025, and no fixes will be provided.
- Network access to api.everon.io over the internet
- No authentication or weak/default credentials accepted by the API
- Charging station infrastructure still configured to connect to Everon backend
Patching may require device reboot — plan for process interruption
/api/v1/advisories/b7b1e534-0485-4601-8441-b339c76542feGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.