Earlier today, LiveOverFlow published a Proof of Concept file on Wololo, confirming that the iOS 9.3 webkit exploit was working on the Nintendo Switch with minimal changes.
This hack was found in the Nintendo Switch Browser, which confirms that the Switch is vulnerable to exploits. While Wololo admits that it means essentially nothing at this point for the ‘end user’, it is still exciting news for those who wish to delve deeper into the Nintendo Switch’s OS, such as looking at the RAM and trying to understand more about the Nintendo Switch’s firmware.
Typically this kind of exploit then leads to the possibility to dump a few libraries, which is then followed by a hunt for a privilege escalation vulnerability (basically, a kernel exploit), which would give full access to the device.
For those who wish to test the exploit on their own Switch, you can find the files on LiveOverFlow’s GitHub and host it locally on your own server. However, if you choose to do this, be sure to remember that tampering with your Switch could void your warranty and potentially lead to permanent damage if done incorrectly. Be sure to watch the above video and follow the included instructions before attempting to test the exploit.
The only surprising thing about this news is that an exploit was found so quickly, and with a webkit designed for a different operating system entirely. I have fond memories of playing homebrew game such as CSPSP on my PSP, and I am looking forward to seeing what can be done with the Nintendo Switch. It’s exciting news for sure, who knows whether this exploit could lead to a homebrew community forming around the Nintendo Switch. Stay tuned.
What do you think of this news? Are you going to utilize the exploit on your own Nintendo Switch? Let us know in the comments!