Pwn2Own Tokyo Day two: TP-Link router and Synology NAS hacked

On the second day of the Pwn2Own Tokyo 2020 hacking competition, bug bounty hunters hacked a TP-Link router and a Synology NAS.

Day 2 of the popular Pwn2Own Tokyo hacking competition is concluded, due to the COVID-19 pandemic the competition has been arranged as a virtual event.

The Pwn2Own Tokyo is actually coordinated by Zero Day Initiative from Toronto, Canada, and white hat hackers taking part in the competition have to demonstrate their ability to find and exploit vulnerabilities in a broad range of devices.

On day one of the competition, bug bounty hunters have successfully hacked a vulnerability a NETGEAR router and a Western Digital NAS devices.

On Day 2, the Flashback team successfully chained three bugs to get code execution through the WAN interface on the TP-Link AC1750 Smart WiFi router. The group of bug bounty hunters won another $20,000 and 2 more Master of Pwn points.

The Syacktiv team successfully hacked the TP-Link AC1750 Smart WiFi router targeting the LAN interface with an exploit triggering three unique bugs to get code execution. The team earned $5,000 and 1 point towards Master of Pwn for this exploit.

The DEVCORE team hacked a Synology DiskStation DS418Play NAS exploiting a heap overflow to get arbitrary code execution. The team earned him $20,000 and 2 points twowards Master of Pwn.

In Day 2 there were also the following partial success:

Team Bugscale targeting the Western Digital My Cloud Pro Series PR410084c0 targeting the LAN interface on the NETGEAR Nighthawk R7800 routerF-Secure Labs targeting the Samsung Q60T televisionSam Thomas of Pentest Ltd targeting the Western Digital My Cloud Pro Series PR4100Pierluigi Paganini

(SecurityAffairs – hacking, Pwn2Own Tokyo)

The post Pwn2Own Tokyo Day two: TP-Link router and Synology NAS hacked appeared first on Security Affairs.