Table of Contents
  • Home
  • /
  • Blog
  • /
  • Hackers Expose Multiple Vulnerabilities in Tesla EV Chargers at Tokyo Contest
January 24, 2025
|
2m

Hackers Expose Multiple Vulnerabilities in Tesla EV Chargers at Tokyo Contest


Tesla logo in white on a vibrant red background, symbolizing innovation and energy.

Security researchers have successfully hacked Tesla's Wall Connector electric vehicle charger multiple times during the Pwn2Own Automotive 2025 hacking contest in Tokyo, Japan. The event, focused on automotive technologies, saw researchers uncovering critical vulnerabilities in various electric vehicle charging systems.

The PHP Hooligans team was the first to compromise the Tesla Wall Connector by exploiting a zero-day bug involving a numeric range comparison without minimum check. This successful hack earned them significant recognition in the cybersecurity community and a substantial cash reward.

Following the PHP Hooligans, the Synacktiv team demonstrated another innovative approach by hacking the Tesla EV charger through the Charging Connector - a method never publicly showcased before. Their breakthrough highlighted the potential security gaps in electric vehicle charging infrastructure.

During the contest's second day, two additional hacking attempts on the Tesla Wall Connector occurred. Sina Kheirkhah from the Summoning Team and PCAutomotive both targeted the charger using different exploit techniques, further emphasizing the device's vulnerability.

The Pwn2Own Automotive contest, organized by Trend Micro's Zero Day Initiative, awarded a total of $335,500 in cash rewards for 23 zero-day vulnerabilities discovered during the event. Participants targeted not only Tesla's chargers but also other electric vehicle charging systems from manufacturers like WOLFBOX, ChargePoint, and Autel.

After the competition concludes, device vendors will have 90 days to develop and release security fixes before the discovered vulnerabilities are publicly disclosed. This approach ensures manufacturers have adequate time to address the identified security weaknesses and protect users from potential cyber threats.

Found this article interesting? Keep visit thesecmaster.com, and our social media page on FacebookLinkedInTwitterTelegramTumblrMedium, and Instagram and subscribe to receive tips like this. 

You may also like these articles: Here are the 5 most contextually relevant blog posts:

Anthony Denis

Anthony Denis a Security News Reporter with a Bachelor's in Business Computer Application. Drawing from a decade of digital media marketing experience and two years of freelance writing, he brings technical expertise to cybersecurity journalism. His background in IT, content creation, and social media management enables him to deliver complex security topics with clarity and insight.

Recently added

Learn More About Cyber Security Security & Technology

“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”

Cybersecurity All-in-One For Dummies - 1st Edition

"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.

Tools

Featured

View All

Learn Something New with Free Email subscription

Subscribe

Subscribe