5 min read
|
Saved February 14, 2026
|
Copied!
Do you care about this?
Day Two of Pwn2Own Automotive 2026 featured intense competition among security researchers, resulting in 29 new exploits and $439,250 awarded. The event has now totaled 66 unique vulnerabilities and over $955,000 in prize money. Fuzzware.io leads the standings as the contest nears its final day.
If you do, here's more
Day Two of Pwn2Own Automotive 2026 showcased intense competition among security researchers testing automotive systems. The event saw participants earn a total of $439,250 for 29 unique 0-day vulnerabilities, bringing the overall tally to $955,750 across 66 vulnerabilities. Fuzzware.io is currently leading the Master of Pwn rankings but with one day left, the outcome remains uncertain.
Several teams made significant breakthroughs. Team MAMMOTH successfully exploited a command injection in the Alpine iLX-F511, earning $10,000 and 2 points. Julien COHEN-SCALI from FuzzingLabs exploited two vulnerabilities in the Phoenix Contact CHARX SEC-3150 to secure $20,000 and 4 points. Neodyme AG demonstrated a buffer overflow vulnerability in the Sony XAV-9500ES for a $10,000 reward and 2 points. Other notable successes included InnoEdge Labs earning $40,000 for exploiting a dangerous method in the Alpitronic HYC50 and Fuzzware.io earning $50,000 for chaining three bugs in the same device.
Not all attempts were successful. Autocrypt faced two failures with the Grizzl‑E Smart 40A, unable to demonstrate their exploits within the time limit. Multiple teams encountered collision issues, where their exploits overlapped with prior attempts, but still managed to earn points and prize money. For instance, the PHP Hooligans hit a two-bug collision on the Autel MaxiCharger AC Elite, yet still left with $20,000 and 3 points. The competition remains fierce as researchers push the limits of automotive security, with the final day promising more high-stakes challenges.
Questions about this article
No questions yet.