


If your box is checked, then put otherapp.bin on the root of your SD card along with soundhax.m4a and launch the song from the sound player.

The exploit takes advantage of this overflow to control the malloc header of the next heap chunk, which allows for arbitrary writes to memory.īy manipulating the free list and causing a stack overflow, the exploit can turn the arbitrary write primitive into ROP and use the gspwn GPU exploit to write shellcode over the text section of the sound process, allowing for code execution.Īll existing versions of Nintendo 3DS Sound prior to Nintendo fixing the vulnerability are now supported.
#3DS SOUNDHACK MP4#
There is a bug in the 3DS Sound application where it uses a memcpy function instead of a unicode strncpy variant to copy a song name from mp4 atom tags onto the heap, potentially causing a buffer overflow. Soundhax (when combined with the Homebrew Launcher) is compatible with versions 9.0.0 through 11.3.0 in the EUR, JPN, KOR, and USA regions. This vulnerability exploits the default sound application preinstalled on all 3DS devices. It is a new exploit that gives you access to the homebrew launcher without needing a game to exploit. Soundhax is a primary homebrew entrypoint that works on firmwares up to 11.3.
