Directly to the content
Shop4Tesla Shop4Tesla
Pwn2Own Automotive 2025: Tesla Wall Connector hacked

Pwn2Own Automotive 2025: Tesla Wall Connector hacked

Tesla is once again the focus of the cybersecurity community - this time through the Pwn2Own Automotive 2025 event in Tokyo. There the Tesla Wall Connector, a popular home charging connection for Tesla-vehicles, has been successfully hacked several times.

The security researchers discovered critical vulnerabilitiesthat allowed them to take control of the Charger or cause it to crash. Tesla is now working at full speed on software patchesto close the security gaps.

But what exactly has happened? And what does this mean for Tesla-owners? Here are the most important findings!


🔍 Tesla Wall Connector: Several hacks uncovered!

As part of the Pwn2Own Automotive 2025 event, the Tesla Wall Connector was compromised several times. Tesla-Owners use this charger worldwide for charging their vehicles at homebut the vulnerabilities discovered show that even these systems are not invulnerable.

Hacker team Exploit Prize money
PHP Hooligans "Numeric Range Comparison Without Minimum Check" - Takeover & crash of the Charger 50.000 $
Synacktive Hack via the charging port - First public demonstration of this method 45.000 $
PCAutomotive Attack with already known vulnerabilities 22.500 $
Summoning Team (Sina Kheirkhah) Two-stage exploit attack 12.500 $


In total, the hacking of the Tesla Wall Connector prize money totaling $129,500 was awarded.


⚠️ What does this mean for Tesla-owners?

Tesla is for his fast Over-the-Air (OTA) updates known. This means that the manufacturer can fix security vulnerabilities through software updates without owners having to intervene manually.

What Tesla-drivers should do now:

Regularly check for & install software updates
Securing the home network & WLAN access to the Charger
Tesla's Keep an eye on patch releases

Tesla now has 90 days timeto close the vulnerabilities before the discovered exploits are are made public.


🔒 Security risk for EV charging infrastructure?

Not only Tesla was the target of the hackers - also other EV chargers were also compromised at the event, including

🔹 ChargePoint Home Flex
🔹 Autel MaxiCharger
🔹 Phoenix Contact CHARX
🔹 EMPORIA

📌 Conclusion:
The results of the event show that EV chargers are an increasingly attractive target for hackers. Manufacturers must increasingly take security measuresto minimize future threats.


📅 What happens next?

Tesla We are now working flat out on software patches work on software patches. In the past Tesla successfully fixed several vulnerabilities that were discovered during similar competitions.

🚀 Tesla-Owners can therefore rest assured that the company will promptly roll out updates to close the discovered gaps.


📌 Conclusion: What can we learn from the Tesla Wall Connector hack?

✅ Several critical vulnerabilities discovered & rewarded with high prize money
✅ Tesla will close the vulnerabilities with OTA updates
✅ EV chargers as a whole are increasingly the focus of hackers
✅ Tesla-Owners should install updates regularly & pay attention to security

📌 Security remains a key issue in electromobility - and Tesla is once again open to working with the cybersecurity community to make its products even more secure.


Keywords: Tesla, Tesla Model Y, Tesla Model 3, Tesla Accessories, Tesla Store, Shop4Tesla, Tesla News, Tesla Wall Connector, Tesla Charger, Tesla Hacking, Pwn2Own, Tesla Cybersecurity, EV Charger security vulnerabilities

Your shopping cart is empty

Start shopping