Ghostwire

CVE-2026-4157: ChargePoint Home Flex revssh Service Command Injection Remote Code Execution Vulnerability. This vulnerability allows...

HIGH CVSS 7.5 EPSS 0.19% Exploit Available

Published: April 11, 2026 | Last Modified: April 11, 2026

Description

ChargePoint Home Flex revssh Service Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of ChargePoint Home Flex devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of OCPP messages. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-26338.

Ghostwire Analysis — What This Means Practically

Exploitation Probability (EPSS): Low — 0.19% (41th percentile)

Low exploitation probability based on current threat landscape data. Standard patching timeline is appropriate.

This analysis is generated by Ghostwire from NVD, CISA KEV, EPSS, and open-source intelligence data. Verify findings through primary sources before acting.

Security Coverage (1 articles)

References