1000 - NCC Group EDG (Alex Plaskett, Cedric Halbronn, Aaron Adams) targeting the Western Digital My Cloud Pro Series PR4100 in the NAS category
SUCCESS - The NCC Group leveraged a memory corruption bug three different ways (and overcame a timing issue) to get code execution on the Western Digital My Cloud Pro Series PR4100. They earn themselves $40,000 and 4 Master of Pwn points.
1030 - Flashback Team of Pedro Ribeiro (
@pedrib1337) && Radek Domanski (
@RabbitPro) targeting the WAN interface of the Cisco RV340 in the router category
SUCCESS - The Flashback team of Pedro and Redek used an impressive stack-based buffer overflow to get code execution on the WAN interface of the Cisco RV340 router. They earn $30,000 and 3 Master of Pwn points.
1100 - Nicolas Devillers (
@nikaiw), Jean-Romain Garnier, and Raphael Rigo (
@_trou_) targeting the Canon ImageCLASS MF644Cdw in the printer category
SUCCESS - The team of Nicolas Devillers, Jean-Romain Garnier, and Raphael Rigo obtained code execution on the Canon ImageCLASS printer through a stack-based buffer overflow. This unique bug chain earns them $20,000 and 2 Master of Pwn points.
1130 - crixer (
@pwning_me), Axel Souchet (
@0vercl0k),
@chillbro4201, and friends from Mofoffensive Research Team targeting the LAN interface of the TP-Link AC1750 Smart Wi-Fi Router in the router category
FAILURE - Unfortunately, the Mofoffensive Team could not get his exploit to work within the time allotted.
1200 - The Synacktiv (
@Synacktiv) team targeting the Western Digital My Cloud Pro Series PR4100 in the NAS category
SUCCESS - The Synacktiv team leveraged a configuration error bug to get code execution on the PR411. They earn $40,000 and 4 Master of Pwn points.
1230 - Q. Kaiser & T. Shiomitsu from IoT Inspector Research Lab targeting the LAN interface of the Cisco RV340 in the router category
SUCCESS - Q. Kaiser & T. Shiomitsu from IoT Inspector Research Lab used 3 unique bugs, incuding an authorization bypass and a commange injection, to get code execution on the Cisco RV340 via the LAN interface. They earn $15,000 and 2 Master of Pwn points.
1300 - The STARLabs Team targeting the Samsung Galaxy S21 in the mobile phone category
COLLISION - The exploit chain used by the STARLabs team included a bug known by the vendor. They still earn $25,000 and 2.5 Master of Pwn points.
1400 - The Synacktiv (
@Synacktiv) team targeting the Sonos One Speaker in the home automation category
SUCCESS - The Synacktiv team used a stack-based buffer over to compromise the Sonos One speaker and play us a tune. They earn $60,000 and 6 Master of Pwn points.
1430 - trichimtrich and nyancat0131 targeting the WAN interface of the Cisco RV340 in the router category
SUCCESS - trichmitrich used nearly all the time on the clock, but his command injection bug is unique. His takeover of the Cisco RV340 via the WAN interface earns him $30,000 and 3 Master of Pwn points.
1500 - Orange Tsai (
@orange_8361), Angelboy (
@scwuaptx) and Meh Chang (
@mehqq_) from the
DEVCORE Research Team targeting the Western Digital My Cloud Pro Series PR4100 in the NAS category
COLLISION - The DEVCORE team successfully exploited the WD PR411, but the bugs they leveraged had been previously used in the competition. Their work still earns them $20,000 and 2 Master of Pwn points.
1530 - The STARLabs Team targeting the LAN interface of the TP-Link AC1750 Smart Wi-Fi Router in the router category
COLLISION - The STARLabs team exploited the LAN interface of the TP-Link AC1750 router, but they used a known bug. This still nets them $2,500 and .5 Master of Pwn points.
1600 - The Synacktiv (
@Synacktiv) team targeting the Lexmark MC3224i in the printer category
SUCCESS - The Synacktiv team combined three unique bugs, including an unprivileged access bug and a command injection bug, to get code execution on the Lexmark MC3224i printer. They earn $20,000 and 2 more Master of Pwn points.
1700 - The STARLabs Team targeting the Western Digital My Cloud Pro Series PR4100 in the NAS category
COLLISION - The exploit chain used by Nguyễn Hoàng Thạch (
hi_im_d4rkn3ss) of STARLabs team included bugs previously used in the contest. They still earn $20,000 and 2 Master of Pwn points.
1745 - The Synacktiv (
@Synacktiv) team targeting the HP Color LaserJet Pro MFP M283fdw in the printer category
COLLISION - The exploit chain used by the Synacktiv team included a bug used earlier in the competition. They still earn $10,000 and 1 Master of Pwn point.
Due to time limitations and resource constraints, the following attempts will occur off the live stream during the evening. Results of these attempts will still be reported here and on Twitter.
— Q. Kaiser & T. Shiomitsu from IoT Inspector Research Lab targeting the Western Digital My Cloud Pro Series PR4100 in the NAS category
FAILURE - Unfortunately, the IoT Inspector Research team could not get their exploit to work within the time allotted.
— The STARLabs Team targeting the 3TB My Cloud Home Personal Cloud from WD in the NAS category
COLLISION - The exploit chain used by Nguyễn Hoàng Thạch (
hi_im_d4rkn3ss) and Phan Thanh Duy (
PTDuy) of STARLabs took over the 3TB My Cloud Home Personal Cloud from WD using a bug previously seen in the competition. They still earn $20,000 and 2 Master of Pwn points.
— Diffense Team targeting the Western Digital My Cloud Pro Series PR4100 in the NAS category
COLLISION - In their Pwn2Own debut, the Diffense Team runs into a collision. They were able to exploit the Western Digital My Cloud Pro Series PR4100, but the bug they leveraged was also used on Day 1. They still earn $20,000 and two Master of Pwn points in their debut effort.
— Orange Tsai (
@orange_8361), Angelboy (
@scwuaptx) and Meh Chang (
@mehqq_) from the
DEVCORE Research Team targeting the Lexmark MC3224i in the printer category
SUCCESS - The DEVCORE team used a code injection bug to take over the Lexmark MC3224i printer. This unique bug chain earned them $20,000 and 2 Master of Pwn points.
— NCC Group EDG (Alex Plaskett, Cedric Halbronn, Aaron Adams) targeting the Lexmark MC3224i in the printer category in the printer category
SUCCESS - The NCC Group again needed multiple attempts, but they successfully exploited the Lexmark MC3224i with a file write bug. The earn $20,000 and 2 Master of Pwn points.
— Bien Pham (
@bienpnn) from Team Orca of Sea Security (
security.sea.com) targeting the WAN interface of the NETGEAR R6700v3 in the router category
FAILURE - Unfortunately, Bien could not get his exploit to work within the time allotted.
— Bien Pham (
@bienpnn) from Team Orca of Sea Security (
security.sea.com) targeting the LAN interface of the NETGEAR R6700v3 in the router category
COLLISION - The two-bug exploit chain used by Bien included bugs used earlier in the competition. He still earn $2,500 and .5 Master of Pwn points.
— Q. Kaiser & T. Shiomitsu from IoT Inspector Research Lab targeting the WAN interface of the NETGEAR R6700v3 in the router category
FAILURE - Unfortunately, the IoT Inspector Research team could not get their exploit to work within the time allotted.
— Diffense Team targeting the LAN interface of the NETGEAR R6700v3 in the router category
FAILURE - Unfortunately, the Diffense Team could not get their exploit to work within the time allotted.