Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
CVE-2025-6978: Arbitrary Code Execution in the Arista NG Firewall
February 05, 2026 | TrendAI Research Team
CONTINUE READING
SUBSCRIBE
Blog post
From Pwn2Own Automotive: Taking Over the Autel Maxicharger
August 22, 2024
Autel
,
Automotive
,
Research
Blog post
Pwn2Own Automotive 2024 - Day Three Results
January 25, 2024
Pwn2Own
,
Automotive
Blog post
Pwn2Own Automotive 2024 - Day One Results
January 23, 2024
Pwn2Own
,
Automotive
,
Tesla
,
IVI
Blog post
Pwn2Own Automotive 2024 - The Full Schedule
January 23, 2024
Pwn2Own
,
Automotive
,
Tesla
,
IVI
,
EV Charger
Blog post
Attack Surface of the Ubiquiti Connect EV Station
December 05, 2023
Automotive
,
Pwn2Own
,
Ubiquiti
Blog post
A Detailed Look at Pwn2Own Automotive EV Charger Hardware
November 29, 2023
Automotive
,
Pwn2Own
,
Reverse Engineering
Blog post
How To: Modifying EV Chargers for Benchtop Experiments
November 09, 2023
Pwn2Own
,
Automotive
,
EV Charger
Blog post
Looking at the Attack Surface of the Sony XAV-AX5500 Head Unit
October 05, 2023
Sony
,
Automotive
,
Infotainment
,
Research
Blog post
Looking at the ChargePoint Home Flex Threat Landscape
September 07, 2023
ChargePoint
,
Automotive
,
Attack Surface
Blog post
Revealing the Targets and Rules for the First Pwn2Own Automotive
August 29, 2023
Pwn2Own
,
Automotive
,
EV
,
IVI
keyboard_arrow_left
keyboard_arrow_right