Rafał Goryl

68 posts

Rafał Goryl banner
Rafał Goryl

Rafał Goryl

@voix44er

Breaking stuff, Security researcher @pixiepointsec | Pwn2Own Toronto 2023, Tokyo 2025, Ireland 2025

Katılım Ağustos 2018
418 Takip Edilen162 Takipçiler
TrendAI Zero Day Initiative
Confirmed! Julien COHEN‑SCALI of @FuzzingLabs targeted the Phoenix Contact CHARX SEC‑3150, chaining two vulnerabilities - an authentication bypass and privilege escalation - to earn $20,000 USD and 4 Master of Pwn points. #Pwn2Own #P2OAuto
TrendAI Zero Day Initiative tweet mediaTrendAI Zero Day Initiative tweet media
English
5
10
33
5.2K
Rafał Goryl retweetledi
kiddo
kiddo@kiddo_pwn·
My very first blog post is live: kiddo-pwn.github.io/blog/2025-11-3… During research, I've run into and documented a simple universal SQLite Injection RCE trick. Enjoy! N-day Analysis about Synology Beestation RCE (CVE-2024-50629~50631) by legendary DEVCORE 🎃 🍊 Thanks to @u1f383 @orange_8361 for original finding and allowing to post, and to @the_emmons for the invaluable references 🔥 Enjoy the Demo! PoC: github.com/kiddo-pwn/CVE-…
English
13
112
417
33.3K
Rafał Goryl retweetledi
Josh
Josh@boredpentester·
All of us the last 3 months of Pwn2own or just me?
Josh tweet media
English
0
1
15
1.4K
Rafał Goryl retweetledi
TrendAI Zero Day Initiative
Another successful collision: @_voix44er from PixiePoint Security succeeded in exploiting the Phillips Hue Bridge, but the bugs he used were collisions with a previous entry. He still earns $10,000 and 2 Master of Pwn points. #Pwn2Own
TrendAI Zero Day Initiative tweet mediaTrendAI Zero Day Initiative tweet media
English
0
4
15
4.1K
Rafał Goryl retweetledi
TrendAI Zero Day Initiative
Boom! Rafal Goryl (@voix44er) of PixiePoint Security needed two attempts but was able to get his exploit of the Phillips Hue Bridge working. He heads off to the disclosure room to provide all the details. #Pwn2Own
English
2
2
17
3.6K
Rafał Goryl retweetledi
PixiePoint Security
PixiePoint Security@pixiepointsec·
And... hot on the heels will be @voix44er attempting the Philips Hue Bridge this week! All the best and have fun!
English
1
1
7
3.2K
Rafał Goryl retweetledi
PixiePoint Security
PixiePoint Security@pixiepointsec·
If u think that Windows research is all we do, think again! In our first IOT blog, @voix44er details the Wolfbox EV charger setup, attack surface, his #Pwn2Own Automotive 2025 bug, exploitation, and best of all, displaying our name on it (in styleee...)! pixiepointsecurity.com/blog/pwn2own-2…
English
0
19
69
6.2K
Rafał Goryl retweetledi
TheZDIBugs
TheZDIBugs@TheZDIBugs·
[ZDI-25-329|CVE-2025-5750] (0Day) (Pwn2Own) WOLFBOX Level 2 EV Charger tuya_svc_devos_activate_result_parse Heap-based Buffer Overflow Remote Code Execution Vulnerability (CVSS 8.8; Credit: Rafal Goryl of PixiePoint Security) zerodayinitiative.com/advisories/ZDI…
English
0
3
14
3.6K
Rafał Goryl retweetledi
lcamtuf
lcamtuf@lcamtuf·
I've been working in cybersecurity for over 25 years. Here are my key insights.
lcamtuf tweet medialcamtuf tweet medialcamtuf tweet medialcamtuf tweet media
English
27
148
1K
48.3K
Rafał Goryl retweetledi
TrendAI Zero Day Initiative
Confirmed (with a collision)! Rafal Goryl of PixiePoint Security used a 2 bug chain to exploit the WOLFBOX Level 2 EV Charger, but one of the bugs was previously known. He earns himself $18,750 and 3.75 Master of Pwn points. #P2OAuto
TrendAI Zero Day Initiative tweet mediaTrendAI Zero Day Initiative tweet media
English
0
1
11
3.1K
Rafał Goryl retweetledi
PixiePoint Security
PixiePoint Security@pixiepointsec·
Annnddd... the odds ARE in your favor! Congrats @voix44er ! This result is just the cherry on the cake. Regardless of what it may be, what we don't see is the dedication and hard work put into the research.. 💪💪💪
TrendAI Zero Day Initiative@thezdi

Success! On his second attempt, Rafal Goryl of PixiePoint Security was able to exploit the WOLFBOX EV charger. He heads off the the disclosure room to provide us with all the details. #P2OAuto #Pwn2Own

English
0
3
9
1.6K
Rafał Goryl retweetledi
PixiePoint Security
PixiePoint Security@pixiepointsec·
Hello world! First post in 2025; @voix44er attempting to pwn WolfBox EV charger at #P2OAuto on Day 2. “May the odds be ever in your favor”!
English
0
5
13
2.2K
Rafał Goryl
Rafał Goryl@voix44er·
@thezdi @dustin_childs Hey @thezdi is it still possible to register entry for Pwn2Own? As I can't get any confirmation for entry registration these past few days over email.
English
1
1
1
115
Rafał Goryl retweetledi
TheZDIBugs
TheZDIBugs@TheZDIBugs·
[ZDI-24-839|CVE-2024-6248] (Pwn2Own) Wyze Cam v3 Cloud Infrastructure Improper Authentication Remote Code Execution Vulnerability (CVSS 7.5; Credit: Rafal Goryl) zerodayinitiative.com/advisories/ZDI…
English
0
2
3
600
Rafał Goryl retweetledi
Tavis Ormandy
Tavis Ormandy@taviso·
The libarchive e8 vulnerability is actually really cool, but the ZDI advisory doesn't explain why it's so wild lol. For some reason, I know about RAR filters, so let me provide the background. 🧵 1/n
English
3
175
602
116.7K