Tesla Model S oFono AT Command Heap-based Buffer Overflow Code Execution Vulnerability. This vulnerability allows local attackers to execute arbitrary code on affected Tesla Model S vehicles. An attacker must first obtain the ability to execute code on the target modem in order to exploit this vulnerability.
The specific flaw exists within the parsing of responses from AT commands. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-23198.
References
Link | Resource |
---|---|
https://www.zerodayinitiative.com/advisories/ZDI-25-261/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
12 Aug 2025, 15:16
Type | Values Removed | Values Added |
---|---|---|
First Time |
Tesla model S Firmware
Tesla model S Tesla |
|
CPE | cpe:2.3:o:tesla:model_s_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:tesla:model_s:-:*:*:*:*:*:*:* |
|
References | () https://www.zerodayinitiative.com/advisories/ZDI-25-261/ - Third Party Advisory |
02 May 2025, 13:53
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
30 Apr 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-30 20:15
Updated : 2025-08-12 15:16
NVD link : CVE-2024-6031
Mitre link : CVE-2024-6031
CVE.ORG link : CVE-2024-6031
JSON object : View
Products Affected
tesla
- model_s
- model_s_firmware
CWE
CWE-122
Heap-based Buffer Overflow