Guided reading | ReSwitch group female hacker Kate Temkin officially announced the chip-level vulnerability of Nintendo's new console Switch after the buffer period, and announced the Fusée Gelée cracking method that can be applied to any system version, which can bypass the BootRom protection part and access memory to run arbitrary code. |
ReSwitch group female hacker Kate Temkin officially announced the chip-level vulnerability of Nintendo's new console Switch after the buffer period, and announced the Fusée Gelée cracking method that can be applied to any system version, which can bypass the BootRom protection part and access memory to run arbitrary code. Another hacker group fail0verflow also published the code of ShofEL2, a cracking method based on similar vulnerabilities, and the method of loading Linux on Github . There is no official news about the release of the homemade Switch firmware and the Switch game Dump.
This crack exploits the USB recovery mode vulnerability of the Nvidia Tegra X1 chip (version 210), which can bypass the bootROM, a key part of the protection chip, and cause memory overflow by sending an overly long control request, thereby obtaining direct memory access. Arbitrary code can be run. The hack can be done with a paper clip or an accessory called the Switchx Pro, just shorting the two contacts of the right handle slot.
The original text comes from: https://www.linuxprobe.com/switch-linux.html