Pwn2Own Automotive 2026: Uncovering 37 Unique Zero-Days

January 22, 2026
VicOne
Pwn2Own Automotive 2026: Uncovering 37 Unique Zero-Days

Hosted by VicOne in collaboration with TrendAI Zero Day Initiative (ZDI), Pwn2Own Automotive 2026 transformed Tokyo Big Sight into a global epicenter of automotive vulnerability research. The event convened elite security researchers from around the world, all focused on one objective: uncovering real-world, exploitable zero-day vulnerabilities in modern automotive technologies. 

 

A Record-Setting Start 

Pwn2Own Automotive 2026 set a new benchmark for the competition, underscored not only by record participation, but also by expanded industry backing. This year, joining Tesla as Title Sponsor, Alpitronic joins as another key partner—reflecting the growing recognition that charging infrastructure is now a critical pillar of the automotive cybersecurity landscape.  

The 2026 contest drew 73 total entries, with 30 attempts scheduled on Day 1 alone, selected through a random draw. Targets spanned: 

  • In-Vehicle Infotainment (IVI) systems 
  • Level 2 and Level 3 EV chargers 
  • Tesla interfaces 


Figure 1. Brian Gorenc, Vice President of Threat Research at TrendAI, Max Cheng, CEO of VicOne, and Adam Laurie, Chief Information/Product Security Officer of Alpitronic, during the opening ceremonies of Pwn2Own Automotive 2026

Figure 1. Brian Gorenc, Vice President of Threat Research at TrendAI ZDI, Max Cheng, CEO of VicOne, and Adam Laurie, Chief Information/Product Security Officer of Alpitronic, during the opening ceremonies of Pwn2Own Automotive 2026


From IVI Systems to EV Chargers 

The first successful exploit of the day came from Neodyme, which leveraged a stack-based buffer overflow to gain a root shell on the Alpine iLX-F511 IVI system. 

Figure 2. Neodyme successfully executing its attack against the Alpine 1LX-F511

Figure 2. Neodyme successfully executing its attack against the Alpine 1LX-F511

Synacktiv, Master of Pwn 2024, delivered one of the day’s most notable performances. The team was the only competitor to attempt the Tesla infotainment USB-based attack—and succeeded, chaining two vulnerabilities through an information leak and an out-of-bounds write to achieve full compromise. Synacktiv also chained three vulnerabilities to gain root-level code execution on the Sony XAV-9500ES IVI system.

Figure 3. Synacktiv successfully compromised the Tesla attempt for Pwn2Own Automotive 2026.

Figure 3. Synacktiv successfully compromised the Tesla attempt for Pwn2Own Automotive 2026.

Fuzzware.io achieved a rapid win against a new Level 3 EV charger target, the Alpitronic HYC50 (Field Mode), exploiting a single out-of-bounds write. The team earned the highest Master of Pwn points for Day 1 and went on to chain additional vulnerabilities against the Autel charger, enabling code execution and charging signal manipulation. They also demonstrated an n-day command injection against the Kenwood DNR1007XR. 

Newcomers Petoworks secured a Round 1 win by chaining a denial-of-service, race condition, and command injection against the Phoenix Contact CHARX SEC-3150. Team Zeroshi, the event’s first Sicilian competitor, followed with a Round 2 win on the same target by exploiting five distinct bugs—the longest exploit chain observed on Day 1. 

By the end of the first day, researchers had uncovered 37 unique zero-day vulnerabilities, setting a new benchmark for the competition, from 17 zero-days for Day 1 in 2025. 

        
AttemptCategoryResult
Hacking Group targeting Kenwood DNR1007XRIn-Vehicle Infotainment (IVI) SystemsFailed
Fuzzware.io targeting Autel MaxiCharger AC Elite Home 40A EV Charger with Charging Connector Protocol / Signal Manipulation add-onLevel 2 Electric Vehicle (EV) ChargersSuccess
Neodyme targeting Alpine iLX-F511In-Vehicle Infotainment (IVI) SystemsSuccess
Team DDOS targeting ChargePoint Home Flex (Model CPH50-K) with Charging Connector Protocol / Signal Manipulation add-onLevel 2 Electric Vehicle (EV) ChargersSuccess
299 targeting Grizzl-E Smart 40ALevel 2 Electric Vehicle (EV) ChargersSuccess
Petoworks targeting Phoenix Contact CHARX SEC-3150 with Charging Connector Protocol / Signal Manipulation add-onLevel 2 Electric Vehicle (EV) ChargersSuccess
Fuzzware.io targeting Kenwood DNR1007XRIn-Vehicle Infotainment (IVI) SystemsSuccess
Synacktiv targeting Sony XAV-9500ESIn-Vehicle Infotainment (IVI) SystemsSuccess
Compass Security targeting Alpine iLX-F511In-Vehicle Infotainment (IVI) SystemsSuccess
Yannik Luca Marchand targeting Kenwood DNR1007XRIn-Vehicle Infotainment (IVI) SystemsSuccess
CIS targeting Alpine iLX-F511In-Vehicle Infotainment (IVI) SystemsFailed
Synacktiv targeting Tesla Infotainment USB-based AttackTesla Infotainment USB-based AttackSuccess
Fuzzware.io targeting EMPORIA Pro Charger Level 2 with Charging Connector Protocol / Signal Manipulation add-onLevel 2 Electric Vehicle (EV) ChargersFailed
Compass Security targeting Grizzl-E Smart 40A with Charging Connector Protocol / Signal Manipulation add-onLevel 2 Electric Vehicle (EV) ChargersSuccess / Collision
Team DDOS targeting Autel MaxiCharger AC Elite Home 40A EV Charger with Charging Connector Protocol / Signal Manipulation add-onLevel 2 Electric Vehicle (EV) ChargersSuccess / Collision
GMO Cybersecurity by Ierae, Inc. targeting Kenwood DNR1007XRIn-Vehicle Infotainment (IVI) SystemsSuccess / Collision
Mia Miku Deutsch targeting Alpine iLX-F511In-Vehicle Infotainment (IVI) SystemsSuccess
Fuzzware.io targeting Alpitronic HYC50 Level 3 EV ChargerLevel 3 Electric Vehicle (EV) ChargersSuccess
CyCraft Technology targeting Grizzl-E Smart 40ALevel 2 Electric Vehicle (EV) ChargersSuccess / Collision
Zeroshi targeting Phoenix Contact CHARX SEC-3150 with Charging Connector Protocol / Signal Manipulation add-onLevel 2 Electric Vehicle (EV) ChargersSuccess
Interrupt Labs targeting Kenwood DNR1007XRIn-Vehicle Infotainment (IVI) SystemsSuccess
78 ResearchLab targeting Alpine iLX-F511In-Vehicle Infotainment (IVI) SystemsSuccess / Collision
Team DDOS targeting Grizzl-E Smart 40A with Charging Connector Protocol / Signal Manipulation add-onLevel 2 Electric Vehicle (EV) ChargersSuccess / Collision
Fuzzware.io targeting Sony XAV-9500ESIn-Vehicle Infotainment (IVI) SystemsFailed
Viettel Cyber Security targeting ChargePoint Home Flex (Model CPH50-K)Level 2 Electric Vehicle (EV) ChargersFailed
FPT NightWolf targeting Kenwood DNR1007XRIn-Vehicle Infotainment (IVI) SystemsSuccess / Collision
Team K targeting Alpine iLX-F511In-Vehicle Infotainment (IVI) SystemsSuccess
78 ResearchLab targeting Phoenix Contact CHARX SEC-3150Level 2 Electric Vehicle (EV) ChargersSuccess / Collision
Jonathan Conrad targeting Grizzl-E Smart 40ALevel 2 Electric Vehicle (EV) ChargersFailed
ANHTUD targeting Sony XAV-9500ESIn-Vehicle Infotainment (IVI) SystemsSuccess

Table 1. The complete contest results of Pwn2Own Automotive 2026 Day One  Note: An attempt is designated a “collision” if it involves a non-unique vulnerability (discovered by another researcher or previously known). An attempt marked as a “success/collision” involves a combination of unique and previously known vulnerabilities.


What Day 1 Signals for the Automotive Industry 

Day 1 of Pwn2Own Automotive 2026 marks a clear escalation from previous years. Compared to 2024 and 2025, this year saw: 

  • Higher researcher participation
  • Broader and more realistic targets
  • Greater reliance on chained exploits rather than isolated flaws 

Notably, many successful attacks leveraged hard-coded credentials, logic flaws, race conditions, and signal manipulation—techniques that mirror real-world attack paths rather than theoretical weaknesses.


Just the Beginning 

Day 1 set the pace, but the competition is far from over. More vulnerabilities remain undiscovered, and the most complex attack chains may still lie ahead. Will we see another creative exploit against EV charging infrastructure—or even a researcher running Doom on an IVI system? 

  

Watch the video below for a quick overview of the highlights of the kickoff of Pwn2Own Automotive 2026. 

Stay tuned for updates from day two of Pwn2Own Automotive 2026 by following VicOne (LinkedIn, X, blog) and the ZDI (LinkedIn, X, blog). 

 

With contributions from Dustin Childs of the ZDI (for details taken from ZDI blog) 

Our News and Views

Gain Insights Into Automotive Cybersecurity

Visit Our Blog

Accelerate Your Automotive Cybersecurity Journey Today

Contact Us