Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Earned $516,500 for 37 Unique 0-day Vulnerabilities

Posted on January 22, 2026January 23, 2026 By CWS

Day One among Pwn2Own Automotive 2026, which delivered $516,500 USD for 37 zero-days, the occasion has now collected $955,750 USD throughout 66 distinctive vulnerabilities, demonstrating the automotive sector’s substantial assault floor.

The competitors showcased exploits focusing on a number of automobile subsystems, together with in-vehicle infotainment (IVI) programs, EV charging stations, and embedded Linux environments.

Researchers efficiently demonstrated command injection flaws, buffer overflows, authentication bypasses, and privilege escalation vulnerabilities throughout units manufactured by Alpine, Kenwood, Phoenix Contact, Alpitronic, and Autel.

Fuzzware.io emerged as a commanding chief within the Grasp of Pwn standings, demonstrating technical sophistication by means of advanced vulnerability chains.

The ultimate day of the competition brings (supply: zerodayinitiative )

Combining command injection vulnerabilities with protocol manipulation add-ons to maximise factors.

The staff exploited a number of bugs within the Phoenix Contact CHARX SEC-3150 and ChargePoint Residence Flex (CPH50-Ok) programs.

DDoS assault focusing on the Phoenix Contact CHARX SEC‑3150 through sign manipulation (supply: zerodayinitiative )

Their technique of chaining a number of vulnerabilities displays superior exploitation strategies required in fashionable automotive safety analysis.

Amongst Day Two’s standout achievements, Rob Blakely of Technical Debt Collectors efficiently chained three bugs: an out-of-bounds learn, reminiscence exhaustion, and a heap overflow towards Automotive Grade Linux, incomes $40,000 USD.

This exploit chain demonstrated the criticality of defending open-source automotive platforms used throughout the {industry}.

EV Charging Infrastructure Vulnerabilities Uncovered

Charging infrastructure emerged as a distinguished vulnerability vector, with a number of groups efficiently bypassing safety on EV charging stations.

Synacktiv exploited a stack-based buffer overflow within the Autel MaxiCharger AC Elite Residence 40A. On the similar time, the Summoning Staff demonstrated command-injection flaws in ChargePoint Residence Flex programs.

Focused the Autel MaxiCharger AC Elite Residence 40A (supply: zerodayinitiative )

These assaults underscore the safety implications of quickly increasing EV charging networks.

The occasion additionally documented collision exploits through which a number of groups independently found the identical vulnerabilities.

Fifteen collision submissions occurred throughout Day Two, decreasing general prize payouts however validating that particular safety flaws are discoverable by means of a number of analysis approaches.

Fuzzware.io’s commanding lead suggests the ultimate day could decide the Grasp of Pwn title, with technical execution and vulnerability discovery velocity changing into decisive components.

Based on zerodayinitiative, the cumulative vulnerability rely of 66 zero-days throughout two days highlights the breadth of automotive assault surfaces, from infotainment and charging protocols to embedded working programs.

Day Three will possible carry further discoveries because the competitors concludes.

The vulnerabilities disclosed at Pwn2Own inform vendor safety roadmaps and contribute to industry-wide hardening efforts throughout related automobile platforms.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:0Day, Earned, Hackers, Unique, Vulnerabilities

Post navigation

Previous Post: Attackers Reverse‑Engineer Patch to Exploit SmarterMail Admin Bypass in the Wild
Next Post: Researchers Detailed r1z Initial Access Broker OPSEC Failures

Related Posts

PoC Exploit Released HPE OneView Vulnerability that Enables Remote Code Execution Cyber Security News
DoJ Seizes $2.8 Million in Crypto From Zeppelin Ransomware Operators Cyber Security News
Microsoft SQL Server 0-Day Vulnerability Exposes Sensitive Data Over Network Cyber Security News
How Prompt Injection Attacks Bypassing AI Agents With Users Input Cyber Security News
RapperBot Hijacking Devices to Launch DDoS Attack In a Split Second Cyber Security News
Doctors Imaging Group Suffers Data Breach Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Infotainment, EV Charger Exploits Earn Hackers $1M at Pwn2Own Automotive 2026
  • New Windows Notepad and Paint Update Brings More Useful AI Features
  • Fresh SmarterMail Flaw Exploited for Admin Access
  • 2 Venezuelans Convicted in US for Using Malware to Hack ATMs
  • North Korean Hackers Adopted AI to Generate Malware Attacking Developers and Engineering Teams

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Infotainment, EV Charger Exploits Earn Hackers $1M at Pwn2Own Automotive 2026
  • New Windows Notepad and Paint Update Brings More Useful AI Features
  • Fresh SmarterMail Flaw Exploited for Admin Access
  • 2 Venezuelans Convicted in US for Using Malware to Hack ATMs
  • North Korean Hackers Adopted AI to Generate Malware Attacking Developers and Engineering Teams

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark