Pwn2Own Day 1: Hackers Net $522K for 34 Zero-Days in SOHO Devices

Pwn2Own Ireland 2025 Day 1 Sees Researchers Earn $522,500 for 34 Zero-Days Across Printers, NAS, and Routers

HIGH
October 22, 2025
5m read
VulnerabilityIoT SecurityThreat Intelligence

Related Entities

Organizations

Trend Micro Zero Day Initiative Canon HP QNAP Synology PhilipsTeam DDOSThe Summoning TeamSynacktivDEVCORE Research Team

Products & Tech

Home Assistant

Full Report

Executive Summary

The first day of Trend Micro's Pwn2Own Ireland 2025 competition, hosted by the Zero Day Initiative (ZDI), concluded with security researchers demonstrating a barrage of 34 unique zero-day vulnerabilities in popular Small Office/Home Office (SOHO) devices. Participants earned $522,500 in a single day, with a perfect 100% success rate across all 17 attempts. The event highlighted significant security weaknesses in a wide range of consumer and business products, including printers, Network-Attached Storage (NAS) devices, routers, and smart home hubs from major vendors like QNAP, Synology, Canon, and HP. All vulnerabilities are now being disclosed to vendors for remediation.


Vulnerability Details

While specific CVEs will not be assigned until after the vendors' 90-day disclosure window, the types of vulnerabilities successfully exploited on Day 1 include:

  • Stack-based Buffer Overflows: A classic memory corruption vulnerability used to achieve code execution.
  • Heap Buffer Overflows: Another form of memory corruption, often leading to arbitrary code execution.
  • Format String Bugs: A rare but powerful vulnerability that can be used to read from and write to arbitrary memory locations.
  • Command Injection: Flaws that allow an attacker to inject and execute arbitrary operating system commands.

These vulnerabilities were chained together in complex exploits. For instance, the 'SOHO Smashup' category required teams to first compromise a router and then pivot from the router to attack a device on the LAN, demonstrating a realistic multi-stage attack scenario.

Affected Systems

The following products were successfully exploited on Day 1:

  • Printers: Canon imageCLASS MF654Cdw, HP DeskJet 2855e
  • NAS Devices: QNAP TS-453E, Synology BeeStation Plus, Synology ActiveProtect Appliance DP320
  • Routers: QNAP Qhora-322
  • Smart Home: Philips Hue Bridge, Home Assistant Green

Exploitation Status

All 34 vulnerabilities were demonstrated as working exploits in the controlled environment of the Pwn2Own competition. There is no evidence that these specific zero-days are being exploited in the wild. However, the ease with which researchers compromised these popular devices suggests that similar, undiscovered flaws may exist and could be in use by malicious actors.

Impact Assessment

The results from Pwn2Own Ireland are a stark reminder of the insecure state of many consumer and SOHO devices.

  • Widespread Risk: These devices are ubiquitous in homes and small businesses, creating a massive attack surface. A successful exploit could lead to data theft, network compromise, or the devices being co-opted into a botnet.
  • Systemic Weaknesses: The 100% success rate indicates that security is often not a top priority for manufacturers of these devices, with many still susceptible to well-understood vulnerability classes like buffer overflows.
  • Value of Coordinated Disclosure: The Pwn2Own model provides a crucial service by identifying and facilitating the patching of these flaws before they are discovered and exploited by adversaries.

Cyber Observables for Detection

Until the vulnerabilities are publicly disclosed, specific observables are not available. However, owners of these devices can monitor for general signs of compromise:

Type Value Description
network_traffic_pattern Unexpected outbound connections from a printer, NAS, or smart hub to the internet. These devices should typically only communicate with known update servers or local clients.
log_source Device administrative logs showing unauthorized configuration changes or new user accounts. An indicator that an attacker has gained administrative control.
other Device behaving erratically, rebooting unexpectedly, or showing high CPU/network usage. General symptoms of a potential malware infection.

Remediation Steps

  1. Monitor for Patches: Owners of the affected devices should closely monitor the support websites of Canon, HP, QNAP, Synology, Philips, and Home Assistant for security advisories and firmware updates over the next 90 days.
  2. Apply Updates Promptly: Once patches are released, they should be applied immediately. This is the only way to remediate these specific zero-day vulnerabilities (M1051 - Update Software).
  3. Network Segmentation: As a general best practice, place IoT and SOHO devices on a separate, isolated network segment that does not have access to critical computers or data storage. This contains the impact of a potential compromise (M1030 - Network Segmentation).

Timeline of Events

1
October 21, 2025
Day 1 of the Pwn2Own Ireland 2025 competition takes place, with researchers successfully demonstrating 34 zero-day vulnerabilities.
2
October 22, 2025
This article was published

MITRE ATT&CK Mitigations

The most important mitigation is to apply firmware updates from the vendors as soon as they become available within the next 90 days.

Mapped D3FEND Techniques:

Isolate SOHO and IoT devices on a separate network VLAN to prevent a compromise from impacting more critical systems.

Mapped D3FEND Techniques:

Restrict access to the administrative interfaces of these devices to only specific, trusted IP addresses on the local network.

D3FEND Defensive Countermeasures

The results from Pwn2Own show that SOHO devices like printers and NAS should be considered inherently untrustworthy. The most effective security measure for home and small business users is to implement Network Isolation. Create a separate Wi-Fi network or VLAN exclusively for these IoT/SOHO devices. This guest network should be configured to prevent devices on it from communicating with devices on the primary trusted network (where laptops, PCs, and sensitive data reside). This containment strategy ensures that even if a zero-day is used to compromise a printer or smart hub, the attacker cannot pivot to more valuable targets on the network.

Owners of the affected products (QNAP, Synology, Canon, HP, etc.) must remain vigilant for firmware updates over the next 90 days. Enable automatic updates on these devices if the feature is available. If not, set a recurring calendar reminder to manually check the vendor's support website for new firmware. Applying these patches as soon as they are released by the vendors is the only way to directly remediate the 34 zero-day vulnerabilities discovered at the event. Failing to do so will leave these devices exposed once the technical details of the vulnerabilities are publicly disclosed by the Zero Day Initiative.

Sources & References

Pwn2Own Ireland 2025: Day One Results
Zero Day Initiative (zerodayinitiative.com) October 21, 2025
Hackers Exploited 34 Zero-Day Vulnerabilities And Earned $522,500 In Pwn2Own Ireland 2025
Cyber Security News (cybersecuritynews.com) October 22, 2025

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Pwn2Ownzero-dayvulnerabilityhackingIoTSOHOZDI

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading