The first day of Trend Micro's Pwn2Own Ireland 2025 competition, hosted by the Zero Day Initiative (ZDI), concluded with security researchers demonstrating a barrage of 34 unique zero-day vulnerabilities in popular Small Office/Home Office (SOHO) devices. Participants earned $522,500 in a single day, with a perfect 100% success rate across all 17 attempts. The event highlighted significant security weaknesses in a wide range of consumer and business products, including printers, Network-Attached Storage (NAS) devices, routers, and smart home hubs from major vendors like QNAP, Synology, Canon, and HP. All vulnerabilities are now being disclosed to vendors for remediation.
While specific CVEs will not be assigned until after the vendors' 90-day disclosure window, the types of vulnerabilities successfully exploited on Day 1 include:
These vulnerabilities were chained together in complex exploits. For instance, the 'SOHO Smashup' category required teams to first compromise a router and then pivot from the router to attack a device on the LAN, demonstrating a realistic multi-stage attack scenario.
The following products were successfully exploited on Day 1:
All 34 vulnerabilities were demonstrated as working exploits in the controlled environment of the Pwn2Own competition. There is no evidence that these specific zero-days are being exploited in the wild. However, the ease with which researchers compromised these popular devices suggests that similar, undiscovered flaws may exist and could be in use by malicious actors.
The results from Pwn2Own Ireland are a stark reminder of the insecure state of many consumer and SOHO devices.
Until the vulnerabilities are publicly disclosed, specific observables are not available. However, owners of these devices can monitor for general signs of compromise:
| Type | Value | Description |
|---|---|---|
network_traffic_pattern |
Unexpected outbound connections from a printer, NAS, or smart hub to the internet. | These devices should typically only communicate with known update servers or local clients. |
log_source |
Device administrative logs showing unauthorized configuration changes or new user accounts. | An indicator that an attacker has gained administrative control. |
other |
Device behaving erratically, rebooting unexpectedly, or showing high CPU/network usage. | General symptoms of a potential malware infection. |
M1051 - Update Software).M1030 - Network Segmentation).The most important mitigation is to apply firmware updates from the vendors as soon as they become available within the next 90 days.
Mapped D3FEND Techniques:
Isolate SOHO and IoT devices on a separate network VLAN to prevent a compromise from impacting more critical systems.
Mapped D3FEND Techniques:
Restrict access to the administrative interfaces of these devices to only specific, trusted IP addresses on the local network.
The results from Pwn2Own show that SOHO devices like printers and NAS should be considered inherently untrustworthy. The most effective security measure for home and small business users is to implement Network Isolation. Create a separate Wi-Fi network or VLAN exclusively for these IoT/SOHO devices. This guest network should be configured to prevent devices on it from communicating with devices on the primary trusted network (where laptops, PCs, and sensitive data reside). This containment strategy ensures that even if a zero-day is used to compromise a printer or smart hub, the attacker cannot pivot to more valuable targets on the network.
Owners of the affected products (QNAP, Synology, Canon, HP, etc.) must remain vigilant for firmware updates over the next 90 days. Enable automatic updates on these devices if the feature is available. If not, set a recurring calendar reminder to manually check the vendor's support website for new firmware. Applying these patches as soon as they are released by the vendors is the only way to directly remediate the 34 zero-day vulnerabilities discovered at the event. Failing to do so will leave these devices exposed once the technical details of the vulnerabilities are publicly disclosed by the Zero Day Initiative.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats