Tesla Cracks Down on FSD Jailbreak Devices
Tesla is remotely disabling Full Self-Driving (FSD) on vehicles after detecting unauthorized hardware modifications, marking a significant escalation in the automaker's enforcement of software-locked features.
The Crackdown
Tesla has permanently revoked FSD access on vehicles across Europe, South Korea, China, and Turkey after detecting unauthorized CAN bus devices. The response includes:
- FSD permanently disabled — reverted to basic Autopilot, even for paid subscribers
- Warranty repairs refused — regardless of whether the device caused damage
- Full liability assigned — owners told they're "100% liable for any accident"
- Cybersecurity flags — Tesla argues devices create exploitable vulnerabilities
The €500 Hack
The devices at the center are small hardware modules that plug into a Tesla's Controller Area Network (CAN) bus. For around €500, they bypass Tesla's regional geofencing and activate FSD in countries where regulators haven't approved the feature.
The concept gained traction after Michal Gapinski (Tesla Android project) demonstrated how CAN bus devices could unlock software-locked features. A gray market flourished, particularly in Europe, where FSD approval has been repeatedly delayed.
Legal Consequences
In South Korea, the Ministry of Land, Infrastructure and Transport has classified these devices as criminal activity under the Automobile Management Act.
Penalties: Up to 2 years in prison or fines of 20 million won (~$13,200 USD).
Related Security Research
While Tesla cracks down on FSD hacks, researchers continue finding vulnerabilities elsewhere:
- Wall Connector Hack (June 2025): Synacktiv researchers hacked the Tesla Wall Connector through its charging port in 18 minutes, gaining full control via firmware downgrade and buffer overflow exploits.
- AMD Infotainment Jailbreak: Technical University of Berlin researchers developed a jailbreak for Tesla's AMD-based infotainment systems using $100 in hardware and voltage fault injection. The attack extracts TPM-protected keys and can activate software-locked features like seat heating and "Acceleration Boost." According to researcher Christian Werling, the key extraction attack still works on the latest Tesla software updates.
The Double Standard
Tesla's crackdown comes amid scrutiny of its own promotion of content created using similar unauthorized devices. Prominent Tesla promoter Omar Qazi (@WholeMarsBlog) published videos showing zero-intervention FSD drives with no steering wheel prompts—later revealed to use third-party "nag defeat" devices that suppress driver monitoring alerts.
The difference: CAN bus hacks activate FSD in unapproved regions (regulatory liability), while nag defeat devices disabled safety monitoring (arguably more dangerous). Tesla benefited from the favorable portrayal while now punishing owners for similar modifications.
The Core Issue
These devices exist because Tesla has collected money for FSD in markets where it can't deliver the product. European owners have paid for a feature perpetually delayed. The remote disable capability—while justified here—raises questions about what consumers actually "own" in the software-defined vehicle era.