
CVE-2024-6029 – Tesla Model S Iris Modem Race Condition Firewall Bypass Vulnerability
https://notcve.org/view.php?id=CVE-2024-6029
30 Apr 2025 — Tesla Model S Iris Modem Race Condition Firewall Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass the firewall on the Iris modem in affected Tesla Model S vehicles. Authentication is not required to exploit this vulnerability. The specific flaw exists within the firewall service. The issue results from a failure to obtain the xtables lock. • https://www.zerodayinitiative.com/advisories/ZDI-25-260 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVE-2024-6030 – Tesla Model S oFono Unnecessary Privileges Sandbox Escape Vulnerability
https://notcve.org/view.php?id=CVE-2024-6030
30 Apr 2025 — Tesla Model S oFono Unnecessary Privileges Sandbox Escape Vulnerability. This vulnerability allows local attackers to escape the sandbox on affected Tesla Model S vehicles. An attacker must first obtain the ability to execute code within the sandbox on the target system in order to exploit this vulnerability. The specific flaw exists within the oFono process. The process allows an attacker to modify interfaces. • https://www.zerodayinitiative.com/advisories/ZDI-25-263 • CWE-250: Execution with Unnecessary Privileges •

CVE-2024-6031 – Tesla Model S oFono AT Command Heap-based Buffer Overflow Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2024-6031
30 Apr 2025 — Tesla Model S oFono AT Command Heap-based Buffer Overflow Code Execution Vulnerability. This vulnerability allows local attackers to execute arbitrary code on affected Tesla Model S vehicles. An attacker must first obtain the ability to execute code on the target modem in order to exploit this vulnerability. The specific flaw exists within the parsing of responses from AT commands. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based bu... • https://www.zerodayinitiative.com/advisories/ZDI-25-261 • CWE-122: Heap-based Buffer Overflow •

CVE-2024-6032 – Tesla Model S Iris Modem ql_atfwd Command Injection Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2024-6032
30 Apr 2025 — Tesla Model S Iris Modem ql_atfwd Command Injection Code Execution Vulnerability. This vulnerability allows local attackers to execute arbitrary code on affected Tesla Model S vehicles. An attacker must first obtain the ability to execute code on the target system in order to exploit this vulnerability. The specific flaw exists within the ql_atfwd process. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. • https://www.zerodayinitiative.com/advisories/ZDI-25-264 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2025-2082 – Tesla Model 3 VCSEC Integer Overflow Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2025-2082
30 Apr 2025 — Tesla Model 3 VCSEC Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected Tesla Model 3 vehicles. Authentication is not required to exploit this vulnerability. The specific flaw exists within the VCSEC module. By manipulating the certificate response sent from the Tire Pressure Monitoring System (TPMS), an attacker can trigger an integer overflow before writing to memory. • https://www.zerodayinitiative.com/advisories/ZDI-25-265 • CWE-190: Integer Overflow or Wraparound •

CVE-2024-13943 – Tesla Model S Iris Modem QCMAP_ConnectionManager Improper Input Validation Sandbox Escape Vulnerability
https://notcve.org/view.php?id=CVE-2024-13943
30 Apr 2025 — Tesla Model S Iris Modem QCMAP_ConnectionManager Improper Input Validation Sandbox Escape Vulnerability. This vulnerability allows local attackers to escape the sandbox on affected affected Tesla Model S vehicles. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the QCMAP_ConnectionManager component. An attacker can abuse the service to assign LAN addresses to the WWAN. • https://www.zerodayinitiative.com/advisories/ZDI-25-262 • CWE-20: Improper Input Validation •

CVE-2023-32156 – Tesla Model 3 Gateway Firmware Signature Validation Bypass Vulnerability
https://notcve.org/view.php?id=CVE-2023-32156
18 Jul 2023 — Tesla Model 3 Gateway Firmware Signature Validation Bypass Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected Tesla Model 3 vehicles. An attacker must first obtain the ability to execute privileged code on the Tesla infotainment system in order to exploit this vulnerability. The specific flaw exists within the handling of firmware updates. The issue results from improper error-handling during the update process. • https://www.zerodayinitiative.com/advisories/ZDI-23-972 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVE-2023-32155 – Tesla Model 3 bcmdhd Out-Of-Bounds Write Local Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2023-32155
18 Jul 2023 — Tesla Model 3 bcmdhd Out-Of-Bounds Write Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected Tesla Model 3 vehicles. An attacker must first obtain the ability to execute code on the wifi subsystem in order to exploit this vulnerability. The specific flaw exists within the bcmdhd driver. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. • https://www.zerodayinitiative.com/advisories/ZDI-23-971 • CWE-787: Out-of-bounds Write •

CVE-2022-42430 – Tesla wowlan_config Use-After-Free Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2022-42430
07 Oct 2022 — This vulnerability allows local attackers to escalate privileges on affected Tesla vehicles. An attacker must first obtain the ability to execute privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of the wowlan_config data structure. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary... • https://www.zerodayinitiative.com/advisories/ZDI-22-1406 • CWE-416: Use After Free •

CVE-2022-42431 – Tesla bcmdhd Buffer Overflow Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2022-42431
07 Oct 2022 — This vulnerability allows local attackers to escalate privileges on affected Tesla vehicles. An attacker must first obtain the ability to execute privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the bcmdhd driver. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root... • https://www.zerodayinitiative.com/advisories/ZDI-22-1407 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •