1986 Jeep Cj7 Amc258 on 2040-cars
Orange Park, Florida, United States
Body Type:Pickup Truck
Engine:258cdi
Vehicle Title:Clear
Fuel Type:Gasoline
For Sale By:Private Seller
Number of Cylinders: 6
Model: CJ
Trim: Jeep
Drive Type: 4wd
Mileage: 234,240
Exterior Color: Brown
Disability Equipped: No
Interior Color: Black
Warranty: Vehicle does NOT have an existing warranty
Jeep CJ for Sale
- 1986 jeep cj7 base sport utility 2-door 4.2l fuel injected great condition
- 1980 jeep cj7 never off road 304v8 4 speed manual great condition
- 1975 jeep cj5(US $7,500.00)
- 1980 jeep cj7 87000 original miles, rare levi's edition with rare extras!
- Cj7 wrangler hard top ford 351 engine borg warner manual transmission 4x4
- 1984 jeep cj7 base sport utility 2-door 4.2l(US $10,000.00)
Auto Services in Florida
Xtreme Auto Upholstery ★★★★★
Volvo Of Tampa ★★★★★
Value Tire Loxahatchee ★★★★★
Upholstery Solutions ★★★★★
Transmission Physician ★★★★★
Town & Country Golf Cars ★★★★★
Auto blog
Autoblog Podcast #370
Tue, Mar 4 2014Episode #370 of the Autoblog podcast is here, and this week, Dan Roth, Michael Harley and Craig Fitzgerald of BangShift and Boldride talk about the 2015 Jeep Renegade, the Consumer Reports list of Cars to Avoid, and the Geneva Motor Show, which opened today. We start with what's in the garage and finish up with some of your questions, and for those of you who hung with us live on our UStream channel, thanks for taking the time. Check out the new rundown below with times for topics, and you can follow along after the jump with our Q&A. Thanks for listening! Autoblog Podcast #370: Topics: 2015 Jeep Renegade Worst Cars of 2014 Geneva Motor Show preview In the Autoblog Garage: 2014 Volkswagen Jetta SE 2014 SRT Viper 2015 Subaru WRX Hosts: Dan Roth, Michael Harley Guests: Craig Fitzgerald Runtime: 01:28:37 Rundown: Intro and Garage - 00:00 Jeep Renegade - 27:28 Cars to Avoid - 41:46 Geneva Motor Show - 59:54 Q&A - 01:11:04 Get the podcast: [UStream] Listen live on Mondays at 10 PM Eastern at UStream [iTunes] Subscribe to the Autoblog Podcast in iTunes [RSS] Add the Autoblog Podcast feed to your RSS aggregator [MP3] Download the MP3 directly Feedback: Email: Podcast at Autoblog dot com Review the show in iTunes Podcasts Geneva Motor Show Jeep Subaru Volkswagen Concept Cars worst cars
NHTSA closes investigation on 4.7M FCA power modules, no recall
Thu, Jul 30 2015FCA US hasn't had the best time with recalls as of late. Not only did the company recently agree to greater safety oversight and paid $105 million to the government, that came just days after hacking fears prompted a 1.4-million model recall campaign. However, a recent decision to close an investigation by the National Highway Traffic Safety Administration means that the automaker doesn't have to worry about another major recall possibly affecting 4.7 million vehicles, according to the agency's report (as a PDF). Last September, the Center for Auto Safety petitioned NHTSA to investigate an alleged problem with the totally integrated power module (TIPM) on these FCA US models. The group claimed that a fault with the component could cause a variety of maladies, including stalls, not starting, catching fire, unintended acceleration, and airbag non-deployment. At the time, it also submitted 70 cases where this had reportedly happened. According to NHTSA, "no valid evidence was presented in support of claims related to airbag non-deployment, unintended acceleration, or fire resulting from TIPM faults and these claims were found to be wholly without merit based on review of the field data and design of the relevant systems and components." The agency did find signs of an issue with the fuel pump relay in some Jeep Grand Cherokees and Dodge Durangos, but FCA US issued recalls for the problem in September 2014 and February 2015. Without anything else to go on, the Feds don't think it's worth investigating this topic any more.
Feds fretting over remote hack of Jeep Cherokee
Fri, Jul 24 2015A cyber-security gap that allowed for the remote hacking of a Jeep Cherokee has federal officials concerned. An associate administrator with the National Highway Traffic Safety Administration said Thursday that news of the breach conducted by researchers Chris Valasek and Charlie Miller had "floated around the entire federal government." "The Homeland Security folks sent out broadcasts that, 'Here's an issue that needs to be addressed,'" said Nathaniel Beuse, an associate administrator with the National Highway Traffic Safety Administration. Valasek and Miller commandeered remote control of the Cherokee through a security flaw in the cellular connection to the car's Uconnect infotainment system. From his Pittsburgh home, Valasek manipulated critical safety inputs, such as transmission function, on Miller's Jeep as he drove along a highway near St. Louis, MO. The scope of the remote breach is believed to be the first of its kind. The prominent cyber-security researchers needed no prior access to the vehicle to perform the hack, and the scope of the remote breach is believed to be the first of its kind. A NHTSA spokesperson said the agency's cyber-security staff members are "putting their expertise to work assessing this threat and the response, and we will take action if we determine it's necessary to protect safety." A Homeland Security spokesperson referred questions about the hack to Chrysler. Fiat Chrysler Automobiles has already been the subject of a federal hearing this month, in which officials scrutinized whether the company had adequately fixed recalled vehicles and repeatedly failed to notify the government about defects. But cyber-security concerns are a new and different species for the regulatory agency. Only hours before the Jeep hack was announced by Wired magazine earlier this week, NHTSA administrator Dr. Mark Rosekind said hacking vulnerabilities were a threat to privacy, safety, and the public's trust with new connected and autonomous technologies that allow vehicles to communicate. NHTSA outlined its response to the cyber-security challenges facing the industry in a report issued Tuesday. In it, the agency summarized its best practices for thwarting attacks and said it will analyze possible real-time infiltration responses. But the agency's ability to handle hackers may only go so far.