Tesla Model S Iris Modem ql_atfwd Command Injection Code Execution Vulnerability. This vulnerability allows local attackers to execute arbitrary code on affected Tesla Model S vehicles. An attacker must first obtain the ability to execute code on the target system in order to exploit this vulnerability.
The specific flaw exists within the ql_atfwd process. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code on the target modem in the context of root. Was ZDI-CAN-23201.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.zerodayinitiative.com/advisories/ZDI-25-264/ |
![]() ![]() |
History
Wed, 30 Apr 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 30 Apr 2025 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Tesla Model S Iris Modem ql_atfwd Command Injection Code Execution Vulnerability. This vulnerability allows local attackers to execute arbitrary code on affected Tesla Model S vehicles. An attacker must first obtain the ability to execute code on the target system in order to exploit this vulnerability. The specific flaw exists within the ql_atfwd process. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code on the target modem in the context of root. Was ZDI-CAN-23201. | |
Title | Tesla Model S Iris Modem ql_atfwd Command Injection Code Execution Vulnerability | |
Weaknesses | CWE-78 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: zdi
Published: 2025-04-30T20:00:40.719Z
Updated: 2025-04-30T20:17:09.792Z
Reserved: 2024-06-14T23:42:00.564Z
Link: CVE-2024-6032

Updated: 2025-04-30T20:17:01.808Z

Status : Awaiting Analysis
Published: 2025-04-30T20:15:21.283
Modified: 2025-05-02T13:53:40.163
Link: CVE-2024-6032

No data.