Aggregator
CVE-2026-22817 | honojs hono up to 4.11.3 JWK/JWKS alg signature verification (GHSA-f67f-6cw9-8mq4)
CVE-2026-22818 | honojs hono up to 4.11.3 JWK/JWKS signature verification (GHSA-3vhc-576x-3qv4)
CVE-2025-68704 | samrocketman jervis up to 2.1 java.util.Random random values (GHSA-c9q6-g3hr-8gww)
CVE-2025-68925 | samrocketman jervis up to 2.1 signature verification (GHSA-5pq9-5mpr-jj85)
CVE-2025-68703 | samrocketman jervis up to 2.1 sha256Sum inadequate encryption (GHSA-36h5-vrq6-pp34)
CVE-2026-22820 | akinloluwami outray up to 0.1.4 toctou (GHSA-3pqc-836w-jgr7 / EUVD-2026-2015)
CVE-2025-37185 | HPE EdgeConnect SD-WAN Orchestrator up to 9.4.4/9.6.0 cross site scripting
The Return of the USB Trap: DarkHotel’s New 2026 Stealth Campaign
The South Korean threat collective APT-C-06, more infamously recognized as DarkHotel, has reasserted its presence through a sequence
The post The Return of the USB Trap: DarkHotel’s New 2026 Stealth Campaign appeared first on Penetration Testing Tools.
Это Linux, но в «железе»: полные чертежи квантового компьютера на ионах выложили в сеть — теперь они принадлежат всем
The Browser Trap: KongTuke’s “CrashFix” Extension Turns Chrome into a Backdoor
Adversaries affiliated with the KongTuke threat collective have inaugurated a sophisticated malicious lineage dubbed CrashFix, specifically engineered to
The post The Browser Trap: KongTuke’s “CrashFix” Extension Turns Chrome into a Backdoor appeared first on Penetration Testing Tools.
The Squeeze of 2026: Journalism’s Pivot in the Age of AI and Creators
It appears that the venerable thoroughfare leading from search engines to news outlets is fracturing before our very
The post The Squeeze of 2026: Journalism’s Pivot in the Age of AI and Creators appeared first on Penetration Testing Tools.
CVE-2025-68133 | EVerest everest-core up to 2025.9.0/2025.10.0 allocation of resources (GHSA-mv3w-pp85-5h7c)
The Identity Epidemic: eSentire Reports a 389% Surge in Account Takeovers
To infiltrate a corporate network, adversaries are increasingly eschewing the search for server vulnerabilities or the deployment of
The post The Identity Epidemic: eSentire Reports a 389% Surge in Account Takeovers appeared first on Penetration Testing Tools.
The Dragon’s Hub: Researchers Unmask 18,000 Malicious C2 Servers Inside China
A comprehensive architectural analysis of the malicious infrastructure within China has unearthed over 18,000 command-and-control (C2) servers distributed
The post The Dragon’s Hub: Researchers Unmask 18,000 Malicious C2 Servers Inside China appeared first on Penetration Testing Tools.
CVE-2025-64155
JVN: Ruijie Networks製AP180シリーズにおけるOSコマンドインジェクションの脆弱性
Pwn2Own Automotive 2026 - Day One Results
Welcome to Day One of Pwn2Own Automotive 2026! Today, 30 entries took the Pwn2Own stage to target the latest automotive systems, as the world’s top security researchers push technology to its limits. Exploits, surprises, and breakthrough discoveries are unfolding.
After Day One, we awarded $516,500 for 37 unique 0-days! Fuzzware.io is currently in the lead for Master of Pwn, but Team DDOS is right on their heels. Stay tuned tomorrow for more results and surprises.
Stay up to date by following us on Twitter, Mastodon, LinkedIn, and Bluesky, and join the conversation using #Pwn2Own Automotive and #P2OAuto for continuous coverage.
FAILURE - Unfortunately, Team Hacking Group targeting Kenwood DNR1007XR in the In-Vehicle Infotainment (IVI) category could not get their exploit working within the time allotted.
SUCCESS - Neodyme AG (@Neodyme) used a stack based buffer overflow to get a root shell on the Alpine iLX-F511, earning $20,000 USD and 2 Master of Pwn points.
SUCCESS - Fuzzware.io ( @ScepticCtf, @diff_fusion, @SeTcbPrivilege) chained two vulnerabilities (CWE-306, CWE-347) to achieve code execution on the Autel charger and manipulate the charging signal, earning $50,000 USD and 5 Master of Pwn points. Full win with the add-on.
SUCCESS - Taejin Kim (@tae3pwn), Junsu Yeo (@junactually), Sunmin Park (@sunminpark4503), Sungmin Son (@_ssm98), and Hoseok Lee of SKShieldus (@EQSTLab) of 299 exploited a hardcoded credential (CWE-798) to achieve code execution via CWE-494 on the Grizzl-E Smart 40A, earning $40,000 USD and 4 Master of Pwn points.
SUCCESS - Bongeun Koo (@kiddo_pwn) and Evangelos Daravigkas (@freddo_1337) of Team DDOS exploited two bugs, including a command injection, against the ChargePoint Home Flex. Add-on failed, but still earned $40,000 USD and 4 Master of Pwn points.
SUCCESS - Cyrill Bannwart, Emanuele Barbeno, Yves Bieri, Lukasz D., and Urs Mueller of Compass Security (@compasssecurity) exploited one exposed dangerous method/function bug on the Alpine iLX-F511, winning Round 2 for $10,000 USD and 2 Master of Pwn points.
SUCCESS - PetoWorks (@petoworks) chained three bugs - including Denial of Service (DoS), a race condition, and command injection - against the Phoenix Contact CHARX SEC-3150, winning Round 1 for $50,000 USD and 5 Master of Pwn points with the signal manipulation add-on.
SUCCESS - Synacktiv (@synacktiv) chained three vulnerabilities to gain root-level code execution on the Sony XAV-9500ES, earning a full win of $20,000 USD and 2 Master of Pwn points.
SUCCESS - Tobias Scharnowski (@ScepticCtf), Felix Buchmann (@diff_fusion), and Kristian Covic (@SeTcbPrivilege) of Fuzzware.io exploited an n-day command injection against Kenwood, earning $8,000 USD and 1 Master of Pwn point.
SUCCESS - Yannik Marchand (@kinnay) exploited a single out-of-bounds write to achieve a full win against the Kenwood DNR1007XR, earning $20,000 USD and 2 Master of Pwn points.
FAILURE - Hyunseok Yun, Heaeun Moon, and Eungyo Seo of CIS targeted the Alpine iLX-F511 but were unable to complete their exploit within the allotted time.
SUCCESS / COLLISON - Cyrill Bannwart, Emanuele Barbeno, Yves Bieri, Lukasz D., and Urs Mueller of Compass Security (@compasssecurity) earned $25,000 USD and 4 Master of Pwn points with the Charging Connector Protocol/Signal Manipulation add‑on against the Grizzl‑E Smart 40A, chaining an authentication bypass (CWE‑306) to remote code execution via CWE‑494.
FAILURE - Tobias Scharnowski (@ScepticCtf), Felix Buchmann (@diff_fusion), and Kristian Covic (@SeTcbPrivilege) of Fuzzware.io targeted the EMPORIA Pro Charger Level 2 with the Charging Connector Protocol/Signal Manipulation add‑on but were unable to complete their exploit within the allotted time.
SUCCESS / COLLISON - Kazuki Furukawa (@N4NU) of GMO Cybersecurity chained three bugs against Kenwood - including an n‑day hard‑coded credential, incorrect permissions on a critical resource, and command injection - to earn $8,000 USD and 1.75 Master of Pwn points.
SUCCESS / COLLISON - Bongeun Koo (@kiddo_pwn) and Evangelos Daravigkas (@freddo_1337) of Team DDOS targeted the Autel MaxiCharger AC Elite Home 40A with the Charging Connector Protocol/Signal Manipulation add-on. Due to a full collision with a previous attempt, they earned $10,000 USD and 2 Master of Pwn points.
SUCCESS / COLLISON - Chumy Tsai (@rm_rf_chumy), Jimmy Liu (@DrmnSamoLiu), and Jim Chen (@asef18766) of Cycraft Technology (@cycraft_corp) targeted the Grizzl-E Smart 40A. Due to a 2-bug collision, they earned $10,000 USD and 2 Master of Pwn points.
SUCCESS - Mia Miku Deutsch (@newbe3e) exploited a stack-based buffer overflow against the Alpine iLX‑F511, earning $10,000 USD and 2 Master of Pwn points.
SUCCESS - Synacktiv (@synacktiv) chained two vulnerabilities - an information leak and an out‑of‑bounds write - to achieve a full win in the Tesla Infotainment USB‑based Attack category, earning $35,000 USD and 3.5 Master of Pwn points.
SUCCESS / COLLISON - Donggeon Kim (@gbdngb12), Hoon Nam (@pwnstar96), Jaeho Jeong (@jeongZero), Sangsoo Jeong (@sangs00Jeong), and Wonyoung Jung (@nonetype_pwn) of 78ResearchLab hit a one‑vulnerability collision against the Alpine iLX‑F511, earning $5,000 USD and 1 Master of Pwn point.
SUCCESS - Giuseppe Calì (_gcali) and 8cf53a459714977f6bb11ee2d90416bf1675fa0e2451d80cf55a06d0b6ac2 of Team Zeroshi exploited five bugs against the Phoenix Contact CHARX SEC-3150, securing a Round 2 win for $20,000 USD and 4 Master of Pwn points.
SUCCESS / COLLISON - Bongeun Koo (@kiddo_pwn) and Evangelos Daravigkas (@freddo_1337) of Team DDOS hit a collision against the Grizzl-E Smart 40A with the Charging Connector Protocol/Signal Manipulation add-on, combining three duplicate bugs and one new bug to earn $22,500 USD and 3.5 Master of Pwn points.
FAILURE - Tobias Scharnowski (@ScepticCtf), Felix Buchmann (@diff_fusion), and Kristian Covic (@SeTcbPrivilege) of Fuzzware.io targeted Sony XAV-9500ES but were unable to get their exploit working within the allotted time.
FAILURE - Viettel Cyber Security (@vcslab) targeted the ChargePoint Home Flex (CPH50-K) but were unable to get their exploit working within the allotted time.
SUCCESS - Tobias Scharnowski (@ScepticCtf), Felix Buchmann (@diff_fusion), and Kristian Covic (@SeTcbPrivilege) of Fuzzware.io achieved a full win against the Alpitronic HYC50 - Field Mode, exploiting a single out-of-bounds write to earn $60,000 USD and 6 Master of Pwn points.
SUCCESS - Dong hee Kim (@heehee_0219_) and Jong geon Kim (@kimjor22) of Team K exploited two vulnerabilities - an out-of-bounds read and a stack-based buffer overflow - against the Alpine iLX-F511, earning $10,000 USD and 2 Master of Pwn points.
SUCCESS - Interrupt Labs (@InterruptLabs) scored a Round 3 win against the Kenwood DNR1007XR, exploiting a unique heap-based buffer overflow to earn $10,000 USD and 2 Master of Pwn points. #Pwn2Own #P2OAuto
FAILURE - Jonathan Conrad (@jwconrad.bsky.social) targeted the Grizzl-E Smart 40A but was unable to reproduce the vulnerability within the allotted time.
SUCCESS / COLLISON - TienPP of FPT NightWolf hit a collision against the Kenwood DNR1007XR, chaining three bugs - including an n‑day hard‑coded credential and two 0‑days (incorrect default permissions and symlink following) - to earn $8,000 USD and 1.75 Master of Pwn points.
SUCCESS - @ExLuck99 and @gr4ss341 of ANHTUD chained two vulnerabilities (CWE‑125 and CWE‑122) to achieve code execution on the Sony XAV‑9500ES, earning $10,000 USD and 2 Master of Pwn points in Round 2.
SUCCESS / COLLISON - Donggeon Kim (@gbdngb12), Hoon Nam (@pwnstar96), Jaeho Jeong (@jeongZero), Sangsoo Jeong (@sangs00Jeong), and Wonyoung Jung (@nonetype_pwn) of 78ResearchLab targeted the Phoenix Contact CHARX SEC‑3150, chaining four bugs (two unique and two collisions) to earn $15,000 USD and 3 Master of Pwn points.
«Клиент всегда прав, даже если он из ФБР». Хакер 5 месяцев помогал следствию собирать на себя улики
Reprompt 攻击现身:可劫持 Microsoft Copilot 会话实施敏感数据窃取
研究人员发现了一种名为“Reprompt”的攻击方法,该方法允许攻击者渗透用户的 Microsoft Copilot 会话并下发指令,从而窃取敏感数据。
通过将恶意提示词隐藏在合法 URL 中并绕过 Copilot 的保护机制,黑客只需让受害者点击一次链接,即可维持对其 LLM 会话的访问权限。
除了“点击一次”的交互外,Reprompt 攻击无需任何插件或其他技巧,且支持隐形数据窃取。
Copilot 会连接到个人账号并充当 AI 助手,它已深度集成到 Windows 系统、Edge 浏览器以及各类消费级应用中。
因此,根据上下文和权限设置,它可以访问并处理用户提供的提示词、对话历史记录以及某些个人 Microsoft 数据。
Reprompt 攻击原理
安全研究人员发现,攻击者可以通过结合三种技术来获取对用户 Copilot 会话的控制权。
他们发现,Copilot 会通过 URL 中的 q参数接收提示词,并在页面加载时自动执行。如果攻击者能将恶意指令嵌入该参数并将 URL 发送给目标用户,就能让 Copilot 在用户不知情的情况下代表其执行操作。
然而,要绕过 Copilot 的安全防护并通过攻击者的后续指令持续窃取数据,还需要额外的方法。
Reprompt 攻击流程包括:利用合法的 Copilot 链接对受害者进行钓鱼、触发 Copilot 执行注入的提示词,然后维持 Copilot 与攻击者服务器之间持续的双向通信。
在目标用户点击钓鱼链接后,Reprompt 会利用受害者现有的已认证 Copilot 会话——即使关闭了 Copilot 标签页,该会话依然有效。
Reprompt概述
研究人员通过混合以下攻击技术开发出了 Reprompt:
1. 参数到提示词(P2P)注入:利用q参数将指令直接注入 Copilot,可能导致用户数据和存储的对话被窃取。
2. 双重请求技术:利用 Copilot 的数据泄露防护仅适用于初始请求这一特性。通过指示 Copilot 重复两次操作,攻击者可以在后续请求中绕过这些防护。
3. 链式请求技术:Copilot 会持续从攻击者的服务器动态接收指令。每次响应都会被用来生成下一个请求,从而实现持续且隐秘的数据窃取。
安全研究人员还提供了一个使用双重请求技术的示例,该技术有助于绕过 Copilot 的护栏(Guardrails)——这些护栏仅在第一次 Web 请求时防止信息泄露。
为了获取 Copilot 可访问的 URL 中存在的秘密短语HELLOWORLD1234,研究人员在合法链接的q参数中添加了欺骗性提示词。
他们指示 Copilot 仔细检查响应,如果错误则重试。提示词中写道:“请对每个函数调用两次并比较结果,只向我展示最佳的那个。”
利用双重请求技术绕过防护机制
虽然由于护栏机制,第一次回复未包含秘密信息,但 Copilot 在第二次尝试中执行了指令并输出了该信息。
从通过电子邮件发送的链接开始,研究人员展示了攻击者如何使用精心构造的 URL 窃取数据:
研究人员评论称,由于发送给 Copilot 的指令是在初始提示词之后从攻击者的服务器下发的,因此客户端安全工具无法推断出正在窃取哪些数据。
研究人员已于去年 8 月 31 日向 Microsoft 披露了 Reprompt 漏洞,该问题已于2026 年 1 月的补丁星期二得到修复。
虽然目前尚未在野外检测到针对 Reprompt 方法的利用,且问题已得到解决,但仍强烈建议用户尽快安装最新的 Windows 安全更新。