Limited, V8, Sunroof, White on 2040-cars
Quincy, Indiana, United States
Body Type:SUV
Vehicle Title:Clear
Engine:4.7L 285Cu. In. V8 GAS SOHC Naturally Aspirated
For Sale By:Dealer
Make: Jeep
Model: Grand Cherokee
Warranty: Vehicle does NOT have an existing warranty
Trim: Limited Sport Utility 4-Door
Options: Sunroof, 4-Wheel Drive, Leather Seats, CD Player
Drive Type: 4WD
Safety Features: Anti-Lock Brakes, Driver Airbag, Passenger Airbag, Side Airbags
Mileage: 138,600
Power Options: Air Conditioning, Cruise Control, Power Locks, Power Windows, Power Seats
Exterior Color: White
For sale is a 2006 Jeep Grand Cherokee Limited, four wheel drive, sunroof, automatic transmission. body is in very good condition, interior leather very nice except drivers seat has wear on the outside bottom of seat (picture included) runs and drives perfectly mostly highway miles, has the auto climate control, 6 disc cd, memory power seat, nearly new tires, and a very low reserve, I don't think you will be disappointed, it is very nice, thanks,mark
Jeep Grand Cherokee for Sale
No reserve leather 8cyl 5.9l limited pw pl sunroof cd player good tires
2008 jeep grand cherokee laredo 4x4 4wd, stone white, navigation, nav,low miles(US $17,995.00)
2002 jeep grand cherokee limited high output 4.7l 4x4
2000 jeep grand cherokee limited 4.7l v8 4x4/awd loaded(US $4,800.00)
1997 jeep grand cherokee
2010 jeep grand cherokee srt8 sport utility 4-door 6.1l - excellent condition(US $37,000.00)
Auto Services in Indiana
Westside Auto Parts ★★★★★
Voelkel`s Collision Repair ★★★★★
Tammy`s Towing And Auto Recycling ★★★★★
Superior Auto Center ★★★★★
Sid`s Towing & Recovery ★★★★★
Safeway Auto Repair-Used Tires ★★★★★
Auto blog
Stellantis expects to hit emissions target without Tesla's help
Tue, May 4 2021Franco-Italian carmaker Stellantis expects to achieve its European carbon dioxide (CO2) emissions targets this year without environmental credits bought from Tesla, its CEO said in an interview published on Tuesday. Stellantis was formed through the merger of France's PSA and Italy's FCA, which spent about 2 billion euros ($2.40 billion) to buy European and U.S. CO2 credits from electric vehicle maker Tesla over the 2019-2021 period. "With the electrical technology that PSA brought to Stellantis, we will autonomously meet carbon dioxide emission regulations as early as this year," Stellantis boss Carlos Tavares said in the interview with French weekly Le Point. "Thus, we will not need to call on European CO2 credits and FCA will no longer have to pool with Tesla or anyone." California-based Tesla earns credits for exceeding emissions and fuel economy standards and sells them to other automakers that fall short. European regulations require all car manufacturers to reduce CO2 emissions for private vehicles to an average of 95 grams per kilometer this year. A Stellantis spokesman said the company is in discussions with Tesla about the financial implications of the decision to stop the pooling agreement. "As a result of the combination of Groupe PSA and FCA, Stellantis will be in a position to achieve CO2 targets in Europe for 2021 without open passenger car pooling arrangements with other automakers," he added. Tesla's sales of environmental credits to rival automakers helped it to announce slightly better than expected first-quarter revenue this week. The next tightening of European regulations will soon be the subject of proposals from the European Commission. The 2030 target could be lowered to less than 43 grams/km. Related Video: Government/Legal Green Alfa Romeo Chrysler Dodge Fiat Jeep Maserati RAM Tesla Citroen Peugeot Emissions Stellantis
Jeep in St. Louis hacked from Pittsburgh
Tue, Jul 21 2015One of America's most popular vehicles contains a security flaw that allows hackers to remotely commandeer it from anywhere on the planet. Cyber-security researchers Chris Valasek and Charlie Miller say they've accessed critical vehicle controls on a 2014 Jeep Cherokee that allowed them to remotely control critical vehicle functions like braking, transmission function, and steering. Automakers have downplayed the possibility a car could be remotely compromised, but the significance of the findings detailed Tuesday could cause them to reevaluate the threats posed to hundreds of thousands of vehicles already on the road. A key finding – the pair needed no physical access to the Jeep to pull off the attack. Valasek and Miller accessed the controls via a security hole in the Sprint cellular connection to Chrysler's UConnect infotainment system. In the course of their research, Valasek sat in his Pittsburgh home and remotely manipulated Miller's Jeep as he drove along a highway outside St. Louis. If you know a car's IP address, they say, a hacker could control it from anywhere. "We didn't add anything, didn't touch it," Valasek told Autoblog. "A customer could drive one of these things off a lot, and they'd have no clue it had these open attack surfaces." Remotely, he disabled brakes, turned the radio volume up, engaged windshield wipers and tampered with the transmission. Further, they could conduct surveillance on the Jeep, measuring its speed and tracking its whereabouts. They conducted the experiments over multiple breaches. They made their findings public on the same day the National Highway Traffic Safety Administration, the federal agency in charge of vehicle safety, released its latest report on the readiness of government and automakers to fend off these sorts of cyber attacks. Later today, two US Senators are expected to introduce legislation that would help consumers better understand the potential risks of car hacking. In the early stages of their research, Valasek and Miller found a security flaw in the car's wi-fi that allowed them to remotely manipulate controls from a range of about three feet. But in recent months, they found another vulnerability in the Sprint cellular connection in the UConnect system. That was a key breakthrough. "Lo and behold, we found we could communicate with this thing using cellular, and then more research, and 'Holy cow,' we're using the Sprint network to communicate with these vehicles," Valasek said.
Hackers stole Jeeps in Texas using FCA's internal dealer software
Fri, Aug 5 2016This article has been updated with details on how the thefts were carried out, and with comments from FCA. It seems the news regarding vehicle hacking continues to get worse, especially when it comes to products from Fiat Chrysler Automobiles. Last year, a Jeep Cherokee in St. Louis, Missouri, was wirelessly hacked from Pittsburgh. Nissan had to shut down its Leaf app because of vulnerabilities. Now, a pair of hackers in Houston, Texas, stole more than 30 Jeeps over a six-month period. The two were arrested by police last Friday while attempting to steal another vehicle. ABC 13 in Houston reports that police had been following Michael Arcee and Jesse Zelay for several months but were unable to catch them in the act until now. The two were using a laptop to connect to and start a vehicle. The thieves were able to access Fiat Chrysler's own DealerCONNECT software. After entering the vehicle identification number, the hackers were able to reprogram the cars' security systems to accept a generic key, according to The Houston Chronicle. Additionally, Automotive News reports that FCA subsequently updated the terms of use for its DealerCONNECT program. These thefts were not related to the UConnect remote hacks from last year. This content is hosted by a third party. To view it, please update your privacy preferences. Manage Settings. In April, this surveillance video showed the theft of a Jeep Wrangler Unlimited. It was this footage that first led the police to Arcee and Zelay. The police began to follow and record the pair. That investigation eventually led to Friday's arrest. Both are charged with unauthorized use of a motor vehicle. In addition, Arcee is charged with felon in possession of a weapon and possession with intent to deliver a controlled substance. According to ABC 13, Homeland Security is investigating more than 100 stolen FCA vehicles that they believe were hacked using this method. After their theft, the vehicles were brought across the border to Mexico. FCA is currently conducting an internal investigation into the matter. After this article was posted, the company reached out to Autoblog, stating "FCA US takes the safety and security of its customers seriously and incorporates security features in its vehicles that help to reduce the risk of unauthorized and unlawful access to vehicle systems and wireless communications. FCA US has been cooperating with Houston Police Department since they first started the investigation.