CVE-2025-8320

Tesla Wall Connector Content-Length Header Improper Input Validation Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Tesla Wall Connector devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the parsing of the HTTP Content-Length header. The issue results from the lack of proper validation of user-supplied data, which can result in memory access past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-26300.
CVSS

No CVSS.

References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tesla:wall_connector_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tesla:wall_connector:-:*:*:*:*:*:*:*

History

12 Aug 2025, 15:18

Type Values Removed Values Added
References () https://www.zerodayinitiative.com/advisories/ZDI-25-711/ - () https://www.zerodayinitiative.com/advisories/ZDI-25-711/ - Third Party Advisory
First Time Tesla
Tesla wall Connector
Tesla wall Connector Firmware
CPE cpe:2.3:o:tesla:wall_connector_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tesla:wall_connector:-:*:*:*:*:*:*:*

30 Jul 2025, 01:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-30 01:15

Updated : 2025-08-12 15:18


NVD link : CVE-2025-8320

Mitre link : CVE-2025-8320


JSON object : View

Products Affected

tesla

  • wall_connector
  • wall_connector_firmware
CWE
CWE-1284

Improper Validation of Specified Quantity in Input