YingMuo

11 posts

YingMuo

YingMuo

@YingMuo

Rookie Security Researcher. Focus on IoT and learning macOS Security.

Katılım Temmuz 2019
202 Takip Edilen235 Takipçiler
YingMuo
YingMuo@YingMuo·
Although I have participated in Pwn2Own Ireland/Toronto three times before, this was my first time applying for Pwn2Own Berlin. Unfortunately, I cannot show my macOS LPE at this year’s event. Rooting for my teammate this time.
NiNi@terrynini38514

Although I was the Master of Pwn at Pwn2Own Toronto 2022, this is my first time participating in #Pwn2Own in person. It’s a shame that I can’t demonstrate the Safari exploit developed by me and @h3xr4bb1t this time nor the other exploits polished by my colleagues at DEVCORE. We initially submitted 15 entries, including an amazing macOS LPE by @YingMuo. zerodayinitiative.com/blog/2026/5/13…

English
1
1
26
2.7K
YingMuo
YingMuo@YingMuo·
The slide from my Pwn2Own QNAP NAS talk at AVTOKYO2025 was published on 11/26. But Ryuokyo Canyon was so beautiful that I completely forgot to post about it on X 😅. You can find the slide on the AVTOKYO website: avtokyo.org/avtokyo2025/ti…]
English
1
15
70
5.4K
YingMuo retweetledi
TrendAI Zero Day Initiative
Confirmed! All that's old is new again as the @DEVCOREteam used multiple injections and a format string bug(!) to exploit the QNAP TS-453E. Their unique bugs earn them $40,000 and 4 Master of Pwn points.
TrendAI Zero Day Initiative tweet media
English
2
18
206
13.7K
YingMuo retweetledi
TrendAI Zero Day Initiative
Boom! YingMuo (@YingMuo), HexRabbit (@h3xr4bb1t), LJP (@ljp_tw) from DEVCORE Research Team and nella17 (@nella17tw) from the DEVCORE Intern Program needed little time to exploit the QNAP TS-453E NAS device. They head off to the disclosure room to provide details. #Pwn2Own
English
0
5
26
5.1K
YingMuo retweetledi
TheZDIBugs
TheZDIBugs@TheZDIBugs·
[ZDI-25-309|CVE-2025-2146] (Pwn2Own) Canon imageCLASS MF656Cdw sfpcmAuthenticateSecAdmin Stack-based Buffer Overflow Remote Code Execution Vulnerability (CVSS 8.8; Credit: YingMuo (@YingMuo) working with DEVCORE Internship Program.) zerodayinitiative.com/advisories/ZDI…
English
0
1
18
2.1K
YingMuo retweetledi
TrendAI Zero Day Initiative
Confirmed! YingMuo (@YingMuo) working with DEVCORE Internship Program used an argument injection and a SQL injection to get their root shell on the QNAP TS-464 NAS. Their third-round victory gets them $20,000 and 4 Master of Pwn points. #Pwn2Own #P2OIreland
TrendAI Zero Day Initiative tweet media
English
1
3
43
5.2K
YingMuo retweetledi
TrendAI Zero Day Initiative
Unfortunately, YingMuo (@YingMuo) of the DEVCORE Internship Program could not get his exploit of the Canon imageCLASS MF656Cdw working within the time allotted.
English
0
1
3
2.8K
YingMuo retweetledi
TrendAI Zero Day Initiative
Success! A DEVCORE Intern was able to execute a stack overflow attack against the TP-Link Omada Gigabit Router and exploit two bugs in the QNAP TS-464 for the SOHO Smashup. They earn $50,000 and 10 Master of Pwn points. #Pwn2Own
TrendAI Zero Day Initiative tweet media
English
0
8
105
66.8K