Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Earned 6,500 for 37 Unique 0-day Vulnerabilities

Hackers Earned $516,500 for 37 Unique 0-day Vulnerabilities

Posted on January 22, 2026January 23, 2026 By CWS

Day One among Pwn2Own Automotive 2026, which delivered $516,500 USD for 37 zero-days, the occasion has now collected $955,750 USD throughout 66 distinctive vulnerabilities, demonstrating the automotive sector’s substantial assault floor.

The competitors showcased exploits focusing on a number of automobile subsystems, together with in-vehicle infotainment (IVI) programs, EV charging stations, and embedded Linux environments.

Researchers efficiently demonstrated command injection flaws, buffer overflows, authentication bypasses, and privilege escalation vulnerabilities throughout units manufactured by Alpine, Kenwood, Phoenix Contact, Alpitronic, and Autel.

Fuzzware.io emerged as a commanding chief within the Grasp of Pwn standings, demonstrating technical sophistication by means of advanced vulnerability chains.

The ultimate day of the competition brings (supply: zerodayinitiative )

Combining command injection vulnerabilities with protocol manipulation add-ons to maximise factors.

The staff exploited a number of bugs within the Phoenix Contact CHARX SEC-3150 and ChargePoint Residence Flex (CPH50-Ok) programs.

DDoS assault focusing on the Phoenix Contact CHARX SEC‑3150 through sign manipulation (supply: zerodayinitiative )

Their technique of chaining a number of vulnerabilities displays superior exploitation strategies required in fashionable automotive safety analysis.

Amongst Day Two’s standout achievements, Rob Blakely of Technical Debt Collectors efficiently chained three bugs: an out-of-bounds learn, reminiscence exhaustion, and a heap overflow towards Automotive Grade Linux, incomes $40,000 USD.

This exploit chain demonstrated the criticality of defending open-source automotive platforms used throughout the {industry}.

EV Charging Infrastructure Vulnerabilities Uncovered

Charging infrastructure emerged as a distinguished vulnerability vector, with a number of groups efficiently bypassing safety on EV charging stations.

Synacktiv exploited a stack-based buffer overflow within the Autel MaxiCharger AC Elite Residence 40A. On the similar time, the Summoning Staff demonstrated command-injection flaws in ChargePoint Residence Flex programs.

Focused the Autel MaxiCharger AC Elite Residence 40A (supply: zerodayinitiative )

These assaults underscore the safety implications of quickly increasing EV charging networks.

The occasion additionally documented collision exploits through which a number of groups independently found the identical vulnerabilities.

Fifteen collision submissions occurred throughout Day Two, decreasing general prize payouts however validating that particular safety flaws are discoverable by means of a number of analysis approaches.

Fuzzware.io’s commanding lead suggests the ultimate day could decide the Grasp of Pwn title, with technical execution and vulnerability discovery velocity changing into decisive components.

Based on zerodayinitiative, the cumulative vulnerability rely of 66 zero-days throughout two days highlights the breadth of automotive assault surfaces, from infotainment and charging protocols to embedded working programs.

Day Three will possible carry further discoveries because the competitors concludes.

The vulnerabilities disclosed at Pwn2Own inform vendor safety roadmaps and contribute to industry-wide hardening efforts throughout related automobile platforms.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:0Day, Earned, Hackers, Unique, Vulnerabilities

Post navigation

Previous Post: Attackers Reverse‑Engineer Patch to Exploit SmarterMail Admin Bypass in the Wild
Next Post: Researchers Detailed r1z Initial Access Broker OPSEC Failures

Related Posts

Critical WordPress Plugin Vulnerability Exposes 70,000+ Sites to RCE Attacks Critical WordPress Plugin Vulnerability Exposes 70,000+ Sites to RCE Attacks Cyber Security News
Microsoft Enhances Windows 11 with March 2026 Updates Microsoft Enhances Windows 11 with March 2026 Updates Cyber Security News
High-Value Windows RDS Exploit Surfaces on Dark Web High-Value Windows RDS Exploit Surfaces on Dark Web Cyber Security News
Threat Actors Targeting Ukraine’s Defense Forces With Charity-Themed Malware Campaign Threat Actors Targeting Ukraine’s Defense Forces With Charity-Themed Malware Campaign Cyber Security News
Apple Releases Critical iOS Update to Combat DarkSword Threat Apple Releases Critical iOS Update to Combat DarkSword Threat Cyber Security News
RapperBot Hijacking Devices to Launch DDoS Attack In a Split Second RapperBot Hijacking Devices to Launch DDoS Attack In a Split Second Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark