JsTypeHax/README.md

20 lines
759 B
Markdown
Raw Normal View History

2019-01-06 18:23:43 +01:00
# JsTypeHax
Wii U browser exploit for system version 5.5.2 and 5.5.3.
Requires a valid payload (`"code550.bin"`) in the root dir and the release files from the [wiiuhaxx_common repo](https://github.com/wiiu-env/wiiuhaxx_common/releases) inside a subfolder called `"wiiuhaxx_common"`.
2019-01-06 18:23:43 +01:00
The environment after getting code execution is **very** fragile. It's recommended to use the [JsTypeHax_payload](https://github.com/wiiu-env/JsTypeHax_payload) to get into a limited, but stable one.
# Requirements
A webserver with php support.
2019-01-06 18:26:35 +01:00
2019-01-06 18:23:43 +01:00
# The bug
`CVE-2013-2857`, Use after free https://bugs.chromium.org/p/chromium/issues/detail?id=240124 .
# Credits
- JumpCallPop, jam1garner, hedgeberg: Inital exploit
- yellows8: ROP
- orboditilt: increasing stability