CVE-2025-32061
Plain English Summary
AI-powered analysis for quick understanding
An attacker can remotely take control of the car's infotainment system with full access by sending a specially crafted Bluetooth packet. This vulnerability affects certain Nissan Leaf models from 2020 and requires the attacker to be within Bluetooth range of the vehicle.
Technical Description
The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment ECU manufactured by Bosch. The issue results from the lack of proper boundary validation of user-supplied data, which can result in a stack-based buffer overflow when receiving a specific packet on the established upper layer L2CAP channel. An attacker can leverage this vulnerability to obtain remote code execution on the Infotainment ECU with root privileges. First identified on Nissan Leaf ZE1 manufactured in 2020.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 15, 2026
about 2 months ago
Last Modified
Feb 18, 2026
about 2 months ago