{"uuid": "bffa4d57-05dc-4603-8064-af3b3ef562dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2082", "type": "seen", "source": "https://t.me/cvedetector/24159", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2082 - Tesla Model 3 VCSEC Integer Overflow Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2082 \nPublished : April 30, 2025, 8:15 p.m. | 1\u00a0hour, 48\u00a0minutes ago \nDescription : Tesla Model 3 VCSEC Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected Tesla Model 3 vehicles. Authentication is not required to exploit this vulnerability.  \n  \nThe specific flaw exists within the VCSEC module. By manipulating the certificate response sent from the Tire Pressure Monitoring System (TPMS), an attacker can trigger an integer overflow before writing to memory. An attacker can leverage this vulnerability to execute code in the context of the VCSEC module and send arbitrary messages to the vehicle CAN bus. Was ZDI-CAN-23800. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-01T00:36:57.000000Z"}