CVE-2025-8320

8.8 HIGH

📋 TL;DR

Network-adjacent attackers can execute arbitrary code on Tesla Wall Connector devices without authentication by sending specially crafted HTTP requests with malicious Content-Length headers. This buffer overflow vulnerability affects Tesla Wall Connector installations that haven't been patched.

💻 Affected Systems

Products:
  • Tesla Wall Connector
Versions: All versions prior to patch
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all Tesla Wall Connector devices with network connectivity enabled. Authentication is not required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attackers to control charging functions, access connected networks, or use the device as a foothold for lateral movement.

🟠

Likely Case

Device takeover enabling manipulation of charging schedules, energy consumption monitoring, or disruption of charging services.

🟢

If Mitigated

Limited impact if devices are network-isolated or behind strict firewalls, though the vulnerability remains present.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

ZDI-CAN-26300 indicates this was reported through coordinated disclosure. The vulnerability requires network adjacency but no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Tesla firmware updates

Vendor Advisory: https://www.zerodayinitiative.com/advisories/ZDI-25-711/

Restart Required: Yes

Instructions:

1. Access Tesla Wall Connector management interface. 2. Check for firmware updates. 3. Apply latest firmware update. 4. Reboot device after update completes.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Tesla Wall Connectors on separate VLAN or network segment

Firewall Restrictions

all

Block all inbound traffic to Tesla Wall Connectors except from authorized management systems

🧯 If You Can't Patch

  • Disconnect Tesla Wall Connectors from network entirely and use local control only
  • Implement strict network access controls allowing only specific IP addresses to communicate with the devices

🔍 How to Verify

Check if Vulnerable:

Check firmware version against latest available from Tesla. If not on latest version, assume vulnerable.

Check Version:

Check device management interface or Tesla mobile app for firmware version

Verify Fix Applied:

Confirm firmware version matches or exceeds patch version from Tesla advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests with abnormal Content-Length values
  • Multiple failed connection attempts
  • Unexpected device reboots

Network Indicators:

  • HTTP requests with Content-Length headers exceeding normal ranges
  • Traffic from unexpected sources to port 80/443 on Wall Connectors

SIEM Query:

source_ip=* AND dest_port=80 AND http_content_length>1000000

🔗 References

📤 Share & Export