Find or Sell Used Cars, Trucks, and SUVs in USA

1988 Jeep Wrangler Sahara Sport Utility 2-door Chevy 350 on 2040-cars

Year:1988 Mileage:185569
Location:

Sprakers, New York, United States

Sprakers, New York, United States

This is technically a 2 owner vehicle we bought it in 88 with 36 miles on it from dealer. it was sold in Canada but not delivered then sold to the dealer in FL. where we bought it. rebuilt it around 94 odo158,000. added 350 bored 40 over,also rebuilt, axles and trans..(front may need u joint work again) it has custom built one of a kind, front & rear bumpers(front bumper not mounted/not in pic) with tow ball and with spots for off-road lights and spot for winch. has  good rear seat delete rag top ,metal half doors w/glass window uppers,, has 2 inch body lift , light bar windshield frame for off-road lights (no lights) custom 3 or 4 core radiator (can't remember exactly)new in 07. have 2 rear bench seats for it  somewhere, might be able to find org carpets if I can find the trunk I put them in back in 1990  this is a great platform for a resto project or just put on the road with a little work. has been unused for last 8 years, I was just waiting for the around too it  to restore it  again but illness/mounting bills has insured that My around to it is never going to come .it is Not perfect, but it is 90% better than all the unrestored 88s that I have seen!  replaced clutch (uses stock Jeep clutch) and brake master a few years ago and a brake line or 2,  it hasn't seen any real use since then. Has  good street tires just to make it roll, will throw in used set of military double beadlock 36in tires and wheels but they will have to be recentered  with the proper bolt pattern and backspacing (see trail worthy fab.com for new centers) This jeep is worthy of a ground up restoration  and needs good home, it did do over 130mph when I last had it on road, it was a beast!!

Auto Services in New York

Wayne`s Auto Repair ★★★★★

Auto Repair & Service
Address: 101 Central Ave, Van-Buren-Point
Phone: (716) 363-6499

Vk Auto Repair ★★★★★

Auto Repair & Service
Address: 1000 Jericho Tpke, Glenwood-Landing
Phone: (929) 224-0634

Village Auto Body Works Inc ★★★★★

Auto Repair & Service, Automobile Body Repairing & Painting, Wheel Alignment-Frame & Axle Servicing-Automotive
Address: 248 Winthrop Ave, Garden-City
Phone: (516) 997-5583

TOWING BROOKLYN TODAY.COM ★★★★★

Auto Repair & Service, Towing, Locks & Locksmiths
Address: 2025 Flatbush Ave, Rochdale-Village
Phone: (646) 470-4869

Total Performance Incorporated ★★★★★

Auto Repair & Service, Automobile Parts & Supplies, Auto Transmission
Address: 18 Ramapo Valley Rd, Nanuet
Phone: (201) 529-4353

Tom & Arties Automotive Repair ★★★★★

Auto Repair & Service, Automobile Body Repairing & Painting
Address: 211 Veterans Rd W, Staten-Island
Phone: (718) 967-7817

Auto blog

Key-swapping thieves steal Jeep Grand Cherokee SRT from FL dealer

Sat, 09 Nov 2013

Just a few weeks back, we reported on the theft of an Audi RS5 by a pair of creative thieves who managed to swipe the car's keys when the salesperson stepped away from their desk. Now, a Florida dealership is missing a Jeep Grand Cherokee SRT8 after some crooks switched the Jeep's keys with an identical, non-functioning set.
According to the report from local NBC affiliate WPTV, the men went in and spoke to a dealer about the Jeep. They walked outside, took a look at it, started it up and in the process managed to switch out the fobs. After doing their time with the salesperson, the thieves walked back out to the car, got in and drove away.
"I mean obviously, the way it was done, I think that they were professionals and they knew what they were doing," said Arrigo Jeep General Manager Joe Tufo. "The fact that they did it in broad daylight and switched the key fob and it was like it was nothing. That's what makes it unique," he added.

Feds fretting over remote hack of Jeep Cherokee

Fri, Jul 24 2015

A cyber-security gap that allowed for the remote hacking of a Jeep Cherokee has federal officials concerned. An associate administrator with the National Highway Traffic Safety Administration said Thursday that news of the breach conducted by researchers Chris Valasek and Charlie Miller had "floated around the entire federal government." "The Homeland Security folks sent out broadcasts that, 'Here's an issue that needs to be addressed,'" said Nathaniel Beuse, an associate administrator with the National Highway Traffic Safety Administration. Valasek and Miller commandeered remote control of the Cherokee through a security flaw in the cellular connection to the car's Uconnect infotainment system. From his Pittsburgh home, Valasek manipulated critical safety inputs, such as transmission function, on Miller's Jeep as he drove along a highway near St. Louis, MO. The scope of the remote breach is believed to be the first of its kind. The prominent cyber-security researchers needed no prior access to the vehicle to perform the hack, and the scope of the remote breach is believed to be the first of its kind. A NHTSA spokesperson said the agency's cyber-security staff members are "putting their expertise to work assessing this threat and the response, and we will take action if we determine it's necessary to protect safety." A Homeland Security spokesperson referred questions about the hack to Chrysler. Fiat Chrysler Automobiles has already been the subject of a federal hearing this month, in which officials scrutinized whether the company had adequately fixed recalled vehicles and repeatedly failed to notify the government about defects. But cyber-security concerns are a new and different species for the regulatory agency. Only hours before the Jeep hack was announced by Wired magazine earlier this week, NHTSA administrator Dr. Mark Rosekind said hacking vulnerabilities were a threat to privacy, safety, and the public's trust with new connected and autonomous technologies that allow vehicles to communicate. NHTSA outlined its response to the cyber-security challenges facing the industry in a report issued Tuesday. In it, the agency summarized its best practices for thwarting attacks and said it will analyze possible real-time infiltration responses. But the agency's ability to handle hackers may only go so far.

FCA issuing software update for 1.4M vehicles to prevent hacking

Fri, Jul 24 2015

In the wake of a Jeep Cherokee being hacked remotely while on the road through its Uconnect infotainment system, FCA US is now issuing a software update for 1.4 million vehicles in the United States. Affected customers will receive a USB stick in the mail with the improved version; owners can check this website to see if their cars are affected. A large variety of models with FCA's 8.4-inch touchscreen infotainment system are affected. They include the 2015 Chrysler 200, 2015 Chrysler 300, 2015 Dodge Charger, and 2015 Dodge Challenger; 2013-2015 Dodge Viper; 2013-2015 Ram 1500, 2500, and 3500; 2013-2015 Ram 3500, 4500, and 5500 chassis cab; 2014-2015 Jeep Grand Cherokee and Cherokee; and 2014-2015 Dodge Durango. According to FCA in its announcement, the new software "insulates connected vehicles from remote manipulation." As of July 23, the company also "fully tested and implemented within the cellular network" additional security to prevent access to many of a vehicle's systems. FCA US says that it's conducting this campaign out of an abundance of caution and disputes the notion that there's a defect with these vehicles. Beyond the demonstration of the hack in the Cherokee, the automaker says that it's unaware of any other reports of these attacks actually happening. Related Video: Statement: Software Update July 24, 2015 , Auburn Hills, Mich. - FCA US LLC is conducting a voluntary safety recall to update software in approximately 1,400,000 U.S. vehicles equipped with certain radios. The recall aligns with an ongoing software distribution that insulates connected vehicles from remote manipulation, which, if unauthorized, constitutes criminal action. Further, FCA US has applied network-level security measures to prevent the type of remote manipulation demonstrated in a recent media report. These measures – which required no customer or dealer actions – block remote access to certain vehicle systems and were fully tested and implemented within the cellular network on July 23, 2015. The Company is unaware of any injuries related to software exploitation, nor is it aware of any related complaints, warranty claims or accidents – independent of the media demonstration.