Your EV Might Be Telling Hackers Where You Park Every Night

Hackers earn $516,500 exposing 76 zero-day vulnerabilities that turn Tesla and other EV systems into surveillance tools

Annemarije de Boer Avatar
Annemarije de Boer Avatar

By

Image: Roboflow Universe

Key Takeaways

Key Takeaways

  • Hackers earned $516,500 exploiting 76 zero-day vulnerabilities across major EV brands
  • Tesla’s infotainment system grants complete root access through chained memory exploits
  • Root access enables GPS extraction, location tracking, and real-time surveillance capabilities

Racing to your morning meeting, you probably don’t think twice about your Tesla’s touchscreen logging every destination. But hackers at Pwn2Own Automotive 2026 just proved that trust is misplaced—earning $516,500 in a single day by completely compromising infotainment systems through chained exploits. Your daily commute data isn’t just vulnerable; it’s practically gift-wrapped for anyone with the right skills.

The Technical Carnage

Researchers found 76 zero-day vulnerabilities across major EV brands, with Tesla’s system fully breached through sophisticated attack chains.

The January 2026 Tokyo competition exposed brutal realities about automotive cybersecurity. Tesla‘s infotainment system fell to a chained attack combining information leaks with out-of-bounds memory writes, granting hackers complete root access. Sony’s XAV-9500ES crumbled under heap-based buffer overflows, while Alpine’s iLX-F511 succumbed to stack-based attacks. These aren’t theoretical vulnerabilities—they’re working exploits that transform your navigation system into a surveillance tool.

From Root Access to Route Tracking

Complete infotainment control enables GPS data extraction, cloud telemetry interception, and real-time location monitoring.

Root access means hackers can extract everything your car knows about you. Navigation logs reveal your daily patterns, while API queries could expose charging locations and home geofencing data. These systems integrate GPS, Bluetooth, Wi-Fi, and cameras into a single attack surface. Think about it—your EV knows where you sleep, work, shop, and even how fast you drive between each location.

With 37 unique zero-days demonstrated versus just 17 the previous year, the attack surface keeps expanding faster than manufacturers can patch it. Security experts now view this escalation as evidence that automotive systems weren’t built with privacy protection as a priority.

Your Defense Options

Vendors have 90 days to patch through Zero Day Initiative coordination, but you can act now.

The automotive industry’s patch cycle moves like government bureaucracy—slowly. Common mitigations include:

  • Disabling automatic cloud syncing
  • Using VPNs for over-the-air updates
  • Auditing app permissions regularly

Some owners disconnect cellular modems entirely, though this kills convenience features you probably paid extra for.

The brutal truth? This industry treated security as an afterthought, and we’re all paying the price in privacy. What started as green transportation has become a privacy battleground where your EV‘s brain knows too much, shares too freely, and protects too little.

Share this

At Gadget Review, our guides, reviews, and news are driven by thorough human expertise and use our Trust Rating system and the True Score. AI assists in refining our editorial process, ensuring that every article is engaging, clear and succinct. See how we write our content here →