Pwn2Own Toronto 2022 - Day Two Results
December 07, 2022 | Dustin ChildsWelcome back to Pwn2Own Toronto! Yesterday, we awarded $400,000 for 26 unique 0-days. We saw the Samsung Galaxy exploited twice and two successful demonstrations in the SOHO Smashup category. Today’s event’s look to be just as exciting. We’ll be updating this blog with results throughout the day.
Results current as of 21:15. All times Eastern (GMT-5). All denominations are in USD.
SUCCESS - for the first attempt of Day 2, ANHTUD Information Security Department was able to execute exploits against 2 bugs (one being a stack-based buffler overflow) on a HP Color LaserJet Pro M479fdw in the Printer category. They earn $10K and 2 Master of Pwn points.
BUG COLLISION - PHPHooligans was able to execute 2 exploits against the WAN interface of the NETGEAR RAX30 AX2400 in the Router category. However, the exploits they used were previously used in the competition. They still earn $10K and 1 Master of Pwn points.
SUCCESS and BUG COLLISION - Bugscale was able to succesfully launch an attack against the Synology router and HP Printer in today's first SOHO SMASHUP challenge using one unique bug and another previously known bug. They earn $37,500 and 7.5 Master of Pwn points.
SUCCESS - Toan Pham and Tri Dang from Qrious Secure were able to execute an attack using 2 bugs against the Sonos One Speaker in the Smart Speaker category. They earn $60K and 6 Master of Pwn points.
SUCCESS - Team Viettel was able to execute their Command Injection, Root Shell attack against the LAN interface of the TP-Link AX1800 in the Router category. They earn $5K and 1 Master of Pwn points.
SUCCESS - Le Tran Hai Tung was able to execute an OOB Write attack against the Canon imageCLASS MF743Cdw in the Printer category. They earn $10K and 2 Master of Pwn points.
SUCCESS - Synacktiv was able to execute their command injection attack against the Lexmark MC3224i in the Printer category. They earn $10K and 2 Master of Pwn points.
SUCCESS and BUG COLLISION - STAR Labs was able to succesfully launch an attack against the Sonos One Speaker in the Smart Speaker category using one unique bug and another previously known bug. They earn $22,500 and 4.5 Master of Pwn points.
BUG COLLISION - Summoning Team was able to execute their command injection attack against the LAN interface of the Synology RT6600ax in the Router category. However, the exploit they used was already used earlier in the competition. They still earn $1250 and 0.5 Master of Pwn points.
SUCCESS and BUG COLLISION - NCC Group EDG was able to succesfully launch an attack against the WAN interface of the NETGEAR RAX30 AX2400 in the Router category using one unique bug and another N-day. They earn $7.5K and 1.5 Master of Pwn points.
SUCCESS - Team Viettel was able to execute their stack-based buffer overflow attack against the Canon imageCLASS MF743Cdw in the Printers category . They earn $10K and 2 Master of Pwn points.
SUCCESS - NCC Group EDG was able to execute their command injectino attack against the Lexmark MC3224i in the Printer category. They earn $10K and 2 Master of Pwn points.
FAILURE - Qrious Secure was unable to get their complete exploit of the NETGEAR router and the Western Digital NAS in the SOHO SMASHUP category working within the time allotted.
BUG COLLISION - DEVCORE was able to execute their Stack Based Buffer Overflow attack against the HP Color LaserJet Pro M479fdw in the Printer category. However, the exploit they used was already used earlier. They still earn $5K and 1 Master of Pwn points.
WITHDRAWN - Ledger Donjon unfortunately withdrew their attempt to attack the WAN interface of the TP-Link AX1800 in the Router category. This results in a -1 Master of Pwn point penalty.
SUCCESS - DEVCORE was able to execute their heap-based buffer overflow attack against the Canon imageCLASS MF743Cdw in the Printer category. They earn $10K and 2 Master of Pwn points.
SUCCESS - Luca MORO (@johncool__) was able to execute their Classic Buffer Overflow attack against the WD My Cloud Pro Series PR4100 in the NAS category. They earn $40K and 4 Master of Pwn points.
SUCCESS - Interrupt Labs was able to execute their improper input validation attack against the Samsung Galaxy S22 in the Mobile Phone category. They earn $25K and 5 Master of Pwn points.
FAILURE - Bugscale was unable to get their exploit of the WAN interface of the NETGEAR RAX30 AX2400 in the Router category working within the time allotted.
SUCCESS and BUG COLLISION - for the final attempt of the night, Aleksei Stafeev was able to succesfully launch an attack against the Lexmark MC3224i in the Printer category using one unique command injection and another bug that was found earlier in the competition. They earn $7.5K and 1.5 Master of Pwn points.