Are theoretically exploitable bugs (e.g. PoC/crash/trigger only) eligible?

No. We only acquire vulnerabilities proven to be exploitable and accompanied by a fully functional exploit working with the latest stable versions of the affected software/system/device. Feel free to contact us if you think that your research may still be eligible.