On the first day, Keen Lab downloaded two fake applications that still ran after rebooting with WiFi flaws and using four vulnerabilities to execute the code. I don't know what bug they use, but Apple has confirmed the WiFi KRACK vulnerability patched in iOS 11.1 so this is probably another issue. One of the holes exploited by Keen Lab is also used by Qihoo 360 Security to hack over WiFi on iOS 11.1 on the second day.
See also: iOS 11.1 was released with a series of new emoji and fixes for the KRACK vulnerability
On the first day, Keen Lab also performed iOS 11 hacking by exploiting bugs on Safari and errors on the system service. As a result, they earned a total prize of $ 155,000.
Richard Zhu, another researcher, also successfully exploited the Safari bug and exited the iOS sandbox to execute the code and earned $ 25, .000.
Founder of Zimperium, Inc. Talking on Twitter that it is important for users to know that the latest phone is not safe. 'Mobile Pwn2Own this year tells us that phones are always unsafe. Don't talk about old phones, even new phones. This is the era of cyber security companies. If you are interested in your data, be prepared, 'said Avraham.
Summary, the first day of Mobile Pwn2Own 2017 hacked 5 times successfully, 2 times failed on many devices, and the 2nd day hacked 6 times all succeeded.
ZDI said Mobile Pwn2Own 2017 is the largest mobile contest with a total of 32 bugs used. 11 successful attacks on Samsung Galaxy S8, Huawei Mate9 Pro and Apple iPhone 7.