Pwn2Own Berlin Day 2: Exchange RCE Chain Earns $200K, 15 Zero-Days Fall
Day two of Pwn2Own Berlin 2026 yields 15 new zero-days worth $385,750. Orange Tsai chains three bugs for SYSTEM-level Exchange RCE, earning the event's largest payout.
Day two of Pwn2Own Berlin 2026 produced 15 new zero-day vulnerabilities and $385,750 in awards, pushing the event total to $908,750 across 39 unique security flaws. The highlight came from Orange Tsai of DEVCORE, who chained three bugs to achieve remote code execution as SYSTEM on Microsoft Exchange Server.
The competition continues through May 16 at the OffensiveCon conference, with AI platforms proving as vulnerable as traditional enterprise software.
Orange Tsai's Exchange Server Chain
The competition's single largest payout went to Orange Tsai for a Microsoft Exchange Server exploit chain worth $200,000 and 20 Master of Pwn points. The attack combined three distinct vulnerabilities to achieve SYSTEM-level code execution on a fully patched Exchange installation.
This demonstration comes at an awkward time for Microsoft, which is currently dealing with CVE-2026-42897, a separate Exchange zero-day already under active exploitation in the wild. Exchange administrators now face two distinct attack vectors targeting their on-premises deployments.
Orange Tsai has a history of Exchange research, having previously discovered ProxyLogon vulnerabilities that were mass-exploited in 2021.
Full Day Two Results
According to the Zero Day Initiative's official results, researchers successfully compromised:
| Target | Researcher | Vulnerability Type | Prize |
|---|---|---|---|
| Microsoft Exchange | Orange Tsai (DEVCORE) | 3-bug RCE chain to SYSTEM | $200,000 |
| Cursor | Le Duc Anh Vu (Viettel) | Code execution | $30,000 |
| NV Container Toolkit | 0xDACA & Noam Trobinski | Use-after-free | $25,000 |
| LM Studio | OtterSec team | Code injection | $20,000 |
| OpenAI Codex | Sina Kheirkhah (Summoning Team) | Undisclosed | $20,000 |
| Cursor | Compass Security | Undisclosed | $15,000 |
| Red Hat Enterprise Linux | Ben Koo (Team DDOS) | Use-after-free privilege escalation | $10,000 |
| Windows 11 | Siyeon Wi | Integer overflow privilege escalation | $7,500 |
Several attempts failed to demonstrate within the 30-minute time limit, including exploits targeting Apple Safari, Microsoft SharePoint, and Mozilla Firefox.
AI Platforms Continue to Fall
Building on Day One's results, AI development tools remained soft targets. Researchers demonstrated vulnerabilities in:
- LM Studio via code injection
- Cursor (compromised twice by different teams)
- OpenAI Codex via undisclosed technique
- Claude Desktop (known vulnerability collision, $10,000 award)
The AI category was introduced for Pwn2Own Berlin 2026, and the results suggest AI agent platforms share many of the same vulnerability classes as traditional software. Code injection, insufficient sandboxing, and trust boundary violations appear throughout the AI targets.
Collision Payouts
When multiple researchers discover the same vulnerability independently, Pwn2Own awards reduced payouts:
- Sina Kheirkhah received $10,000 for Claude Desktop (collision)
- STARLabs received $2,500 for NVIDIA Megatron Bridge (collision)
- Out Of Bounds received $28,000 for Ollama and $17,750 for LiteLLM (partial collisions)
Collisions indicate these vulnerabilities are discoverable by multiple skilled researchers, which raises the probability that malicious actors have found them as well.
Event Standings
After two days, the leaderboard shows:
- Orange Tsai (DEVCORE) - leading with the Exchange chain
- Viettel Cyber Security - consistent performance across targets
- STARLabs - multiple successful demonstrations
Day three continues today with additional attempts against AI infrastructure, browsers, and enterprise software.
Why This Matters
Pwn2Own serves as a pressure test for vendor security programs. Every vulnerability demonstrated here gets reported to vendors, who typically have 90 days to patch before public disclosure.
The Exchange RCE chain is particularly significant given Microsoft's current struggle with CVE-2026-42897. Organizations running on-premises Exchange now know that at least four distinct zero-day vulnerabilities exist in their deployments: one under active exploitation and three more awaiting patches from the Pwn2Own disclosures.
For AI platform developers, the message is clear. The same vulnerability classes that plagued traditional software for decades are present in AI tooling. LiteLLM's recent SQL injection issues showed how quickly these flaws get exploited once discovered. The Pwn2Own results suggest there's more to find.
Related Articles
24 Zero-Days Fall on Day One of Pwn2Own Berlin 2026
Security researchers exploited Windows 11, Microsoft Edge, Red Hat Linux, and multiple AI platforms on the first day of Pwn2Own Berlin 2026, earning $523,000 for 24 unique zero-day vulnerabilities.
May 14, 2026Exchange Server Zero-Day CVE-2026-42897 Exploited via Crafted Emails
Microsoft confirms active exploitation of CVE-2026-42897, an XSS flaw in Exchange OWA that executes JavaScript via malicious emails. No patch available yet.
May 16, 2026Langflow RCE Exploited Within 20 Hours of Disclosure
CVE-2026-33017 (CVSS 9.3) lets attackers execute arbitrary Python code on Langflow AI pipelines without authentication. Exploitation began before any PoC existed.
Mar 21, 2026Pwn2Own Automotive 2026 Ends With 76 Zero-Days, $1M+ Awarded
Fuzzware.io claims Master of Pwn at Tokyo competition after researchers demonstrate record-breaking exploits against Tesla, EV chargers, and infotainment systems.
Jan 23, 2026