Trend Micro’s Zero Day Initiative (ZDI) announced that over $380,000 was awarded on Day 1 of Pwn2Own Automotive 2025, a hacking contest that was held in Tokyo.
In total, the organizers awarded $382,750 for 16 unique working zero-day exploits targeting infotainment systems, electric vehicle (EV) chargers, and automotive operating systems. The team fuzzware.io (composed of Tobias Scharnowski (@ScepticCtf), Felix Buchmann (@diff_fusion), and Kristian Covic (@SeTcbPrivilege)) earned $50000 and received 10 Master of Pwn points.
That wraps up Day 1 of #Pwn2Own Automotive 2025! We awarded $382,750 for 16 unique 0-days. The https://t.co/ELqV0E3vQ5 team is current in the lead for Master of Pwn, but @SinSinology is right on their heels. Stay tuned tomorrow for more results and surprises. #P2OAuto pic.twitter.com/UEhsCMG4mg
— Zero Day Initiative (@thezdi) January 22, 2025
Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) received the biggest reward, $50,000 and 5 Master of Pwn points, for demonstrating a hard-coded cryptographic key bug in the Ubiquiti charger.
Confirmed! @SinSinology proves he's never going to give us up or let us down by using a hard-coded cryptographic key bug in the #Ubiquiti charger. He earns himself $50,000 and 5 Master of Pwn points – putting him in the early lead. #P2OAuto pic.twitter.com/ZSSdwNl1BW
— Zero Day Initiative (@thezdi) January 22, 2025
The PHP Hooligans also earned $50,000 and 5 Master of Pwn points for demonstrating a heap-based buffer overflow to exploit the Autel charger.
Another confirmation! The PHP Hooligans used a heap-based buffer overflow to exploit the Autel charger. They earn $50,000 and 5 Master of Pwn points. #P2OAuto #Pwn2Own pic.twitter.com/fmS6FTYoUc
— Zero Day Initiative (@thezdi) January 22, 2025
The Synacktiv team chained a stack-based buffer overflow and a known bug in OCPP to exploit the ChargePoint with signal manipulation through the connector. The team earned $47,500 and 4.75 Master of Pwn points.
Rob Blakely and Andres Campuzano of the Technical Debt Collectors exploited Automotive Grade Linux using multiple bugs, earning $33,500 and 3.5 Master of Pwn points despite one known bug.
The complete list of exploits demonstrated on Day 1 of Pwn2Own Automotive 2025 is available here.
Curiously, no attempts were made to demonstrate vulnerabilities in a Tesla vehicle, despite organizers offered a $500,000 reward for an autopilot exploit.
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
(SecurityAffairs – hacking, Pwn2Own Automotive 2025)