Wrangler Automatic Roof Rack Soft Top 4.0l 6 Cylinder Sport Aftermarket Alloys on 2040-cars
Gainesville, Georgia, United States
Vehicle Title:Clear
Engine:4.0L 242Cu. In. l6 GAS OHV Naturally Aspirated
For Sale By:Dealer
Body Type:Sport Utility
Fuel Type:GAS
Make: Jeep
Warranty: Vehicle does NOT have an existing warranty
Model: Wrangler
Trim: Sport Sport Utility 2-Door
Options: CD Player
Power Options: Air Conditioning
Drive Type: 4WD
Mileage: 38,441
Sub Model: Sport
Number of Cylinders: 6
Exterior Color: Red
Interior Color: Gray
Jeep Wrangler for Sale
Auto Services in Georgia
Young`s Upholstery & Seat Covers ★★★★★
Vic Williams Tire & Auto ★★★★★
United Auto Care ★★★★★
Unique Auto App ★★★★★
Ultimate Benz Service Center ★★★★★
Transmission For Less.Com ★★★★★
Auto blog
Supplier says Jeep Cherokee hack only affects FCA cars
Wed, Aug 5 2015Harman doesn't think that drivers need to worry about any further hacks of its products. The company supplies FCA's Uconnect infotainment system where a software vulnerability is responsible for a 1.4-million vehicle recall. "This experimental hack is unique to Chrysler," Harman CEO Dinesh Paliwal said to Automotive News. "This does not exist, to our assessment, in any other vehicle." The reason that the company wouldn't be involved is that automakers aren't simply plugging in the existing infotainment systems into new vehicles. According to Paliwal, Harman supplies the unit, but FCA and other automakers are able to make additional modifications for their vehicles. The National Highway Traffic Safety Administration has also recently taken up the question of broader software vulnerabilities in Harman's products. On July 29, the agency began investigating the company to check for similarities between Uconnect and the infotainment systems supplied to other automakers. The Jeep hack became national news when two researchers were remotely able to take control of a Cherokee. The vulnerability in the cellular connection even gave control over the brakes. "Once people get in the car and get into the CAN bus, then you can start to mimic and mess up many, many things in the car," Paliwal said to Automotive News. Politicians immediately responded with legislation to create federal standards in hopes of protecting drivers better. NHTSA also opened an investigation to make sure the automaker's software update actually solved the problem. Related Video:
Jeep Liberty replacement takes shape
Wed, 16 Jan 2013Now that the Liberty has left us for greener pastures, it's time to start looking into the future of the midsize Jeep model. The next all-new vehicle for the off-road brand will be the SUV you see here, effectively replacing the Liberty, and not necessarily carrying on with that name.
From the sides, the prototype you see here sort of looks like a miniature version of the handsome Grand Cherokee, albeit with a bit more in the way of body sculpting. Up front, the seven-slat grille will be front and center, with completely revised headlamp designs that are reportedly angular and sweep well into the front fenders (you can sort of see what we're talking about in the side profile). That doesn't sound very Jeep-like, but we'll reserve judgment until we, you know, see the thing.
The bigger question with the Liberty replacement will be whether or not its off-road chops will be up to snuff. After all, the two previous generations of Liberty models were body-on-frame traditional SUVs, whereas this new Jeep rides on a larger version of the Dodge Dart platform.
Jeep in St. Louis hacked from Pittsburgh
Tue, Jul 21 2015One of America's most popular vehicles contains a security flaw that allows hackers to remotely commandeer it from anywhere on the planet. Cyber-security researchers Chris Valasek and Charlie Miller say they've accessed critical vehicle controls on a 2014 Jeep Cherokee that allowed them to remotely control critical vehicle functions like braking, transmission function, and steering. Automakers have downplayed the possibility a car could be remotely compromised, but the significance of the findings detailed Tuesday could cause them to reevaluate the threats posed to hundreds of thousands of vehicles already on the road. A key finding – the pair needed no physical access to the Jeep to pull off the attack. Valasek and Miller accessed the controls via a security hole in the Sprint cellular connection to Chrysler's UConnect infotainment system. In the course of their research, Valasek sat in his Pittsburgh home and remotely manipulated Miller's Jeep as he drove along a highway outside St. Louis. If you know a car's IP address, they say, a hacker could control it from anywhere. "We didn't add anything, didn't touch it," Valasek told Autoblog. "A customer could drive one of these things off a lot, and they'd have no clue it had these open attack surfaces." Remotely, he disabled brakes, turned the radio volume up, engaged windshield wipers and tampered with the transmission. Further, they could conduct surveillance on the Jeep, measuring its speed and tracking its whereabouts. They conducted the experiments over multiple breaches. They made their findings public on the same day the National Highway Traffic Safety Administration, the federal agency in charge of vehicle safety, released its latest report on the readiness of government and automakers to fend off these sorts of cyber attacks. Later today, two US Senators are expected to introduce legislation that would help consumers better understand the potential risks of car hacking. In the early stages of their research, Valasek and Miller found a security flaw in the car's wi-fi that allowed them to remotely manipulate controls from a range of about three feet. But in recent months, they found another vulnerability in the Sprint cellular connection in the UConnect system. That was a key breakthrough. "Lo and behold, we found we could communicate with this thing using cellular, and then more research, and 'Holy cow,' we're using the Sprint network to communicate with these vehicles," Valasek said.