Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
OpenClaw Chain Flaws Expose 245 Vulnerabilities Public
May 15, 2026
Gunra Ransomware RaaS Expands After Conti Locker Operations Shifting
May 15, 2026
Shai-Hulud Worm Steals Developer Secrets from GitHub Kubernetes
May 15, 2026
Home/CyberSecurity News/Microsoft Edge, Windows 11, LiteLLM H Hacked Pwn2Own
CyberSecurity News

Microsoft Edge, Windows 11, LiteLLM H Hacked Pwn2Own

Pwn2Own Berlin 2026 commenced with a surge of zero-day exploits, targeting modern browsers, operating systems, and emerging AI platforms. On Day One alone, security researchers successfully hacked...

Marcus Rodriguez
Marcus Rodriguez
May 15, 2026 3 Min Read
2 0

Pwn2Own Berlin 2026 commenced with a surge of zero-day exploits, targeting modern browsers, operating systems, and emerging AI platforms.

Table Of Content

  • Edge Sandbox Escape
  • Windows 11 Privilege Escalations
  • LiteLLM Exploited
  • AI and Developer Tools Under Pressure

On Day One alone, security researchers successfully hacked Microsoft Edge, Windows 11, and LiteLLM, earning a total of $523,000 for 24 unique vulnerabilities.

The results highlight a growing reality that AI ecosystems and core enterprise technologies are increasingly exposed to complex, chained attacks.

Edge Sandbox Escape

One of the most impactful demonstrations came from Orange Tsai of the DEVCORE Research Team, who executed a sophisticated sandbox escape against Microsoft Edge.

The exploit chained four distinct logic vulnerabilities, turning minor flaws into a full system compromise.

Microsoft Edge Exploited (Source: Zero Day Initiative)
Microsoft Edge Exploited (Source: Zero Day Initiative)

This advanced technique earned $175,000 and 17.5 Master of Pwn points, placing DEVCORE in the lead.

The attack underscores how modern browser security can still be bypassed when multiple weaknesses are combined strategically.

Windows 11 Privilege Escalations

Microsoft Windows 11 emerged as another major target, with several successful privilege escalation attacks throughout the day.

Windows 11 Exploited (Source: Zero Day Initiative)
Windows 11 Exploited (Source: Zero Day Initiative)

Additional researchers later demonstrated attacks using heap-based buffer overflows and use-after-free vulnerabilities.

Angelboy and TwinkleStar03 of DEVCORE exploited an improper access control flaw to gain elevated privileges.

Another Windows 11 Exploited (Source: Zero day Initiative)
Another Windows 11 Exploited (Source: Zero Day Initiative)

These repeated compromises show that even mature operating systems remain vulnerable to memory corruption and access control issues.

LiteLLM Exploited

AI infrastructure faced serious scrutiny, with LiteLLM falling to a full-chain exploit by researcher k3vg3n.

The attack combined three vulnerabilities, including Server-Side Request Forgery (SSRF) and code injection, allowing full system takeover.

LiteLLM Exploited (Source: Zero day Initiative)
LiteLLM Exploited (Source: Zero Day Initiative)

The exploit earned $40,000 and highlighted how AI frameworks, especially those handling external inputs and APIs, can introduce critical security gaps if not properly hardened.

AI and Developer Tools Under Pressure

Other AI-focused targets also experienced successful compromises. OpenAI Codex was exploited using a CWE-150 flaw by Compass Security researchers.

NVIDIA’s Megatron Bridge was breached multiple times due to overly permissive allow lists and path-traversal vulnerabilities.

NVIDIA Exploited (Source: Zero day Initiative)
NVIDIA Exploited (Source: Zero Day Initiative)

Meanwhile, IBM X-Force researchers successfully exploited a single bug in the NV Container Toolkit.

These findings reinforce concerns that AI and developer tooling ecosystems are still maturing in terms of secure design and threat resilience.

Not every attempt succeeded. Several researchers failed to exploit targets such as OpenAI Codex and Oracle Autonomous AI Database within the time limit.

Additionally, multiple “collision” cases were recorded, where working exploits relied on previously known vulnerabilities.

Linux Exploited (Source: Zero day Initiative)
Linux Exploited (Source: Zero Day Initiative)

While still rewarded, these cases highlight a persistent issue: organizations failing to promptly patch known security flaws.

According to Zero Day Initiative, Day One results from Pwn2Own Berlin 2026 reveal a major shift in the threat landscape.

Attackers are no longer focused solely on traditional software but are actively targeting AI platforms, inference engines, and developer tools.

With DEVCORE leading the competition and more high-value targets ahead, the event is expected to uncover even deeper vulnerabilities in the coming days, offering a stark warning to vendors and enterprises alike.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackBreachExploitPatchSecurityThreatzero-day

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

OrBit Rootkit Steals SSH & Sudo Credentials from Hackers Harvest

Next Post

Hackers Abuse OAuth Flow to Steal Microsoft Device Authorization

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
OrBit Rootkit Steals SSH & Sudo Credentials from Hackers Harvest
May 15, 2026
Microsoft Warns: Attackers Use HPE Agent for Malware-
May 15, 2026
Tycoon 2FA Operators Use OAuth Phishing to Bypass Adopt Device
May 15, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us