Overview

Our member competed on day 1 of Pwn2Own Berlin 2026 and successfully exploited two AI-related targets. The total prize was $28,000 and 3.75 Master of Pwn Points.

Pwn2Own Berlin 2026
Pwn2Own Berlin 2026

What is Pwn2Own

Pwn2Own is the premier hacking competition organized by Trend Micro's Zero Day Initiative (ZDI). Security researchers from around the world demonstrate exploits of previously undisclosed vulnerabilities (0-days) against real-world targets, and successful demonstrations are rewarded with substantial cash prizes and Master of Pwn Points.

Pwn2Own Berlin 2026 is being held over three days from May 14 to May 16, at the OffensiveCon venue in Berlin.

Contest Rules

Time Limits and Order

Each entry is given a 30-minute window, within which the contestant may attempt the exploit up to three times, with each attempt capped at 10 minutes.

The order of attempts against each target is determined by a random drawing held the day before the contest (May 13 this year). When multiple teams enter the same target, the drawing fixes the first, second, and subsequent attempt order. Prizes are reduced stepwise by attempt order: 100% for the first attempt, 50% for the second and third, and 25% for all remaining. This reduction applies even when the vulnerability is a unique 0-day independently discovered by the team, purely on the basis of attempt order. Master of Pwn Points, however, are not subject to attempt-order reduction and are awarded in full as long as the exploit is unique.

Bug Collisions

If a vulnerability prepared by a contestant is determined to already be known to the vendor or to have been previously reported by another researcher, it is treated as a "bug collision" and both the prize and Master of Pwn Points are reduced.

The reduction is calculated per bug: only the colliding portion of the exploit chain is discounted to 50%, while unique portions remain at 100%. For example, in a 4-bug chain in a $40,000 category with 2 colliding bugs, the 2 unique bugs are worth $20,000 (100%) and the 2 colliding bugs are worth $10,000 (50%), for a total of $30,000.

Day 1 Results

Demonstrating the RCE on stage
Demonstrating the RCE on stage
Reverse shell remotely controlling the target after achieving RCE on Megatron Bridge
Reverse shell remotely controlling the target after achieving RCE on Megatron Bridge

Methodology and Disclosure Outside the Contest

Our vulnerability discovery is centered on LLM utilization combined with our members' expertise and manual analysis as a hybrid approach. The entries brought to this contest were also built using this method.

We submitted a total of three entries to this contest. However, due to the large number of participating teams this year and the rapid filling of category slots, approximately six additional products could not be entered. These vulnerabilities are being reported individually to each product's developer in accordance with responsible disclosure procedures.

On Technical Details

In accordance with Pwn2Own rules, the technical details of this entry will be published only after vendor fixes and Zero Day Initiative's coordinated disclosure process. At the time of this article, internal component details and PoCs are withheld.

Ongoing Vulnerability Research

We have developed a proprietary approach that leverages LLMs for vulnerability research, and we will continue investigating major software including AI and LLM stacks. Based on this hands-on vulnerability discovery expertise, we provide AI-driven security assessment and consulting services. If you are interested, please feel free to contact us.