{"id":85268,"date":"2022-10-03T03:30:12","date_gmt":"2022-10-03T03:30:12","guid":{"rendered":"https:\/\/harchi90.com\/released-ps5-kernel-exploit-webkit-vulnerability-for-firmware-4-03\/"},"modified":"2022-10-03T03:30:12","modified_gmt":"2022-10-03T03:30:12","slug":"released-ps5-kernel-exploit-webkit-vulnerability-for-firmware-4-03","status":"publish","type":"post","link":"https:\/\/harchi90.com\/released-ps5-kernel-exploit-webkit-vulnerability-for-firmware-4-03\/","title":{"rendered":"Released! PS5 Kernel exploit + Webkit vulnerability for Firmware 4.03"},"content":{"rendered":"
\n

<\/p>\n

<\/p>\n

Oh, wow, only a few hours after tweeting that this needed to be \u201cironed out\u201d, SpecterDev has now published his implementation of the PS5 IPV6 Kernel exploit!<\/p>\n

This release relies on the Webkit vulnerability as an entry point, meaning it will work on any PS5 (including PS5 Digital edition) running firmware 4.03. Lower firmwares might work (although the exploit might need tweaking). Higher firmwares will not work at the moment (they are not vulnerable to the Webkit exploit)<\/p>\n

PS5 4.03 Kernel exploit is here!<\/h2>\n

SpecterDev warns about significant limitations<\/strong> of this exploit. Notably:<\/p>\n

    \n
  1. The exploit is fairly unstable, and in his experience will work about 30% of the time. If you are trying to run it, don’t give up, it might require several attempts before the exploit gets through<\/li>\n
  2. Possibly more important, this exploit gives us read\/write access, but no execute! This means no possibility to load and run binaries at the moment, everything is constrained within the scope of the ROP chain. The current implementation does however enable debug settings.<\/li>\n<\/ol>\n

    More precisely, from the exploit’s readme:<\/p>\n

    Currently Included<\/h3>\n