JsTypeHax/README.md

759 B

JsTypeHax

Wii U browser exploit for system version 5.5.2 and 5.5.3.
Requires a valid payload ("code550.bin") in the root dir and the release files from the wiiuhaxx_common repo inside a subfolder called "wiiuhaxx_common".

The environment after getting code execution is very fragile. It's recommended to use the JsTypeHax_payload to get into a limited, but stable one.

Requirements

A webserver with php support.

The bug

CVE-2013-2857, Use after free https://bugs.chromium.org/p/chromium/issues/detail?id=240124 .

Credits

  • JumpCallPop, jam1garner, hedgeberg: Inital exploit
  • yellows8: ROP
  • orboditilt: increasing stability