# JsTypeHax Wii U browser exploit for system version 5.5.2 and 5.5.3. Requires a valid payload (`"code550.bin"`) in the root dir and the release files from the [wiiuhaxx_common repo](https://github.com/wiiu-env/wiiuhaxx_common/releases) inside a subfolder called `"wiiuhaxx_common"`. The environment after getting code execution is **very** fragile. It's recommended to use the [JsTypeHax_payload](https://github.com/wiiu-env/JsTypeHax_payload) to get into a limited, but stable one. # Requirements A webserver with php support. # The bug `CVE-2013-2857`, Use after free https://bugs.chromium.org/p/chromium/issues/detail?id=240124 . # Credits - JumpCallPop, jam1garner, hedgeberg: Inital exploit - yellows8: ROP - orboditilt: increasing stability