Pwn2Own Automotive 2026 Day 3: New Master of Pwn Announced and Other Highlights

January 26, 2026
VicOne
Pwn2Own Automotive 2026 Day 3: New Master of Pwn Announced and Other Highlights

Pwn2Own Automotive 2026 has crossed the finish line with a record-breaking performance. As the world’s largest zero-day vulnerability discovery contest, the three-day event roared to a triumphant conclusion, with researchers successfully identifying 76 unique zero-day vulnerabilities across 73 attemptsIt was a masterclass in speed and precision, challenging the world's best to secure the future of software-defined vehicles (SDVs) and electric vehicle (EV) infrastructure.

 

Attempt Highlights 

The first successful attempt of the day was from Petoworks, breached the Grizzl-E Smart 40A by leveraging a single buffer overflow bug.  

For IVIs, Team DDOS used a stack-based buffer overflow to hack the Alpine iLXF511. While Viettel Cyber Security targeted the Sony XAV9500ES and gained code execution privileges via a heap-based buffer overflow. 

Juurin Oy, composed of Aapo Oksman, Elias Ikkelä-Koski and Mikael Kantola, is back at Pwn2Own for their attempt for Kenwood DNR1007XR and Alpitronic HYC50. They exploited a link-following vulnerability to breach the Kenwood device. Leveraging a Time-of-Check to Time-of-Use (TOCTOU) bug against the Level 3 charger, it capped its successful exploit, not only by a video, but by installing a playable copy of the classic game, Doom. 

Figure 1. Juurin Oy Exploits TOCTOU Bug in Alpitronic HYC50 to Run Doom

Figure 1. Juurin Oy Exploits TOCTOU Bug in Alpitronic HYC50 to run Doom


        
AttemptCategoryResult
Team MST targeting Kenwood DNR1007XRIn-Vehicle Infotainment (IVI) SystemsSuccess / Collision
Viettel Cyber Security targeting Sony XAV-9500ESIn-Vehicle Infotainment (IVI) SystemsSuccess
Fuzzware.io targeting Alpine iLX-F511In-Vehicle Infotainment (IVI) SystemsSuccess / Collision
Qrious Secure targeting Grizzl-E Smart 40ALevel 2 Electric Vehicle (EV) ChargersSuccess / Collision
Qrious Secure targeting Kenwood DNR1007XRIn-Vehicle Infotainment (IVI) SystemsSuccess
Team DDOS targeting Alpine iLX-F511In-Vehicle Infotainment (IVI) SystemsSuccess
Petoworks targeting Grizzl-E Smart 40ALevel 2 Electric Vehicle (EV) ChargersSuccess
Juurin targeting Alpitronic HYC50Level 3 Electric Vehicle (EV) ChargersSuccess
Viettel Cyber Security targeting Kenwood DNR1007XRIn-Vehicle Infotainment (IVI) SystemsSuccess / Collision
Autocrypt targeting Alpine iLX-F511In-Vehicle Infotainment (IVI) SystemsSuccess
Juurin targeting Kenwood DNR1007XRIn-Vehicle Infotainment (IVI) SystemsSuccess
Pwn4S0n1c targeting Autel MaxiCharger AC Elite Home 40A EV ChargerLevel 2 Electric Vehicle (EV) ChargersSuccess / Collision
FPT NightWolf targeting Alpine iLX-F511In-Vehicle Infotainment (IVI) SystemsSuccess

Table 1. The complete contest results of Pwn2Own Automotive 2025 day three. Note: An attempt is designated a “collision” if it involves a non-unique vulnerability (discovered by another researcher or previously known). An attempt marked as a “success/collision” involves a combination of unique and previously known vulnerabilities.)


Pwn2Own Automotive 2026 Master of Pwn 

After three days of intense competition at Automotive World in Tokyo, the German research team Fuzzware.io has secured the coveted title of Master of Pwn 2026. 

Fuzzware.io's path to the crown was paved with high-profile takedowns of some of the most popular EV infrastructure in the world: 

  • Alpitronic HYC50 (Field Mode): A devastating "Out-of-Bounds Write" exploit that granted them full control over this commercial fast charger. 
  • Autel MaxiCharger: A complex 2-bug chain that combined code execution with their signature Signal Manipulation technique. 
  • Phoenix Contact CHARX: A "hat-trick" exploit involving three separate bugs and two add-ons, showcasing the team's ability to chain multiple vulnerabilities for maximum impact. 
  • Emporia & ChargePoint: Continued success against home chargers, using signal manipulation to prove that residential units are just as vulnerable as commercial stations. 

Figure 2. 2026 Master of Pwn, Fuzzware.io, with Dustin Childs, Head of Threat Awareness of TrendAI ZDI, Max Cheng, CEO of VicOne, and Brian Gorenc, Vice President of Threat Research at TrendAI ZDI.

Figure 2. 2026 Master of Pwn, Fuzzware.io, with Dustin Childs, Head of Threat Awareness of TrendAI ZDI, Max Cheng, CEO of VicOne, and Brian Gorenc, Vice President of Threat Research at TrendAI ZDI. 

As the 2026 champions, Scharnowski, Buchmann, and Covic return home not just with the "Master of Pwn" trophy, but with the distinction of setting a new standard for automotive security research. 


Figure 3. The top 5 teams of Pwn2Own Automotive 2026. Consistent with the broader Pwn2Own series, the Automotive edition grants 'Master of Pwn' points for every verified exploit.

Figure 3. The top 5 teams of Pwn2Own Automotive 2026. Consistent with the broader Pwn2Own series, the Automotive edition grants 'Master of Pwn' points for every verified exploit.

 

Watch the video below for a quick overview of the highlights from the third and final day of Pwn2Own Automotive 2026. 

That concludes Pwn2Own Automotive 2026! VicOne is honored to have co-hosted the third edition of this premier event alongside TrendAI Zero Day Initiative (ZDI). This competition did more than just showcase the ingenuity of the world’s top security researchers; it created a vital space for collaboration with industry leaders—strengthening the foundations of cybersecurity as the ecosystem accelerates toward the Software-Defined Vehicle (SDV) era and an increasingly connected Electric Vehicle Infrastructure.

 

Follow VicOne (LinkedIn, X, blog) for more Pwn2Own Automotive updates. To read more research on vulnerabilities in connected vehicles and learn best security practices, visit our resource center. 

 

With contributions from Dustin Childs of the ZDI 


Our News and Views

Gain Insights Into Automotive Cybersecurity

  • Pwn2Own Automotive 2026 Day 3: New Master of Pwn Announced and Other Highlights
    Blog
    January 26, 2026
    Pwn2Own Automotive 2026 set a new record with 76 unique zero-day vulnerabilities discovered, exposing the rapidly expanding attack surface across SDVs, IVI systems, and EV charging infrastructure. The final day crowned Fuzzware.io as Master of Pwn 2026, with 28 Master of Pwn points.
    Read More
  • Pwn2Own Automotive 2026 Day 2: EV Chargers Hit Full Throttle
    Blog
    January 23, 2026
    Day 2 delivered 29 new zero-days, pushing the total to a record 66. Researchers repeatedly compromised Level 2/3 EV chargers and IVI systems using practical flaws like exposed interfaces and command injection. The takeaway: automotive and charging infrastructure attacks are now repeatable at scale—shifting cyber risk from theoretical to immediate operational impact.
    Read More
  • Pwn2Own Automotive 2026: Uncovering 37 Unique Zero-Days
    Blog
    January 22, 2026
    Pwn2Own Automotive 2026 Day 1 opened with record-breaking momentum, with researchers successfully compromising infotainment systems, EV chargers, and Tesla interfaces—highlighting how expansive today’s automotive attack surface has become. The surge in entries and chained exploits confirms a clear shift: in the SDV era, automotive cyber risk is no longer isolated to the vehicle, but systemic across the entire ecosystem.
    Read More
  • Pwn2Own Automotive 2026: Turning Zero-Day Discovery into Automotive Foresight
    Blog
    January 15, 2026
    Pwn2Own Automotive 2026 exposes critical zero-day vulnerabilities in software-defined vehicles before they escalate into real-world business and operational risk. By ensuring zero-day vulnerabilities move from exposure to resolution, the event transforms discovery into Automotive Foresight—helping organizations stay ahead of risk before it reaches the road.
    Read More
Visit Our Blog

Accelerate Your Automotive Cybersecurity Journey Today

Contact Us