CVE-2024-6032

Tesla Model S Iris Modem ql_atfwd Command Injection Code Execution Vulnerability. This vulnerability allows local attackers to execute arbitrary code on affected Tesla Model S vehicles. An attacker must first obtain the ability to execute code on the target system in order to exploit this vulnerability. The specific flaw exists within the ql_atfwd process. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code on the target modem in the context of root. Was ZDI-CAN-23201.
CVSS

No CVSS.

References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tesla:model_s_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tesla:model_s:-:*:*:*:*:*:*:*

History

12 Aug 2025, 15:11

Type Values Removed Values Added
CPE cpe:2.3:h:tesla:model_s:-:*:*:*:*:*:*:*
cpe:2.3:o:tesla:model_s_firmware:*:*:*:*:*:*:*:*
References () https://www.zerodayinitiative.com/advisories/ZDI-25-264/ - () https://www.zerodayinitiative.com/advisories/ZDI-25-264/ - Third Party Advisory
First Time Tesla
Tesla model S Firmware
Tesla model S

30 Apr 2025, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-30 20:15

Updated : 2025-08-12 15:11


NVD link : CVE-2024-6032

Mitre link : CVE-2024-6032


JSON object : View

Products Affected

tesla

  • model_s_firmware
  • model_s
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')