From WikiTemp, the GBAtemp wiki
 
(One intermediate revision by one other user not shown)
Line 3: Line 3:
 
| image      =  
 
| image      =  
 
| type        = exploit
 
| type        = exploit
| author      = [[User:ichfly|ichfly]], GateWay
+
| author      = ichfly, GateWay
 
| contributor =  
 
| contributor =  
 
| version    =  
 
| version    =  
Line 22: Line 22:
 
}}
 
}}
 
The '''MSET exploit''' is an exploit for the System Settings application of the Nintendo 3DS (MSET). The vulnerability was originally discovered by [[User:ichfly|ichfly]] in 2012, and was later used by the GateWay 3DS. The exploit uses a flaw in the Nintendo DS profile settings, where a long nickname or message will cause a stack buffer overflow, crashing the 3DS part of the console.
 
The '''MSET exploit''' is an exploit for the System Settings application of the Nintendo 3DS (MSET). The vulnerability was originally discovered by [[User:ichfly|ichfly]] in 2012, and was later used by the GateWay 3DS. The exploit uses a flaw in the Nintendo DS profile settings, where a long nickname or message will cause a stack buffer overflow, crashing the 3DS part of the console.
 +
 +
The vulnerability used by this exploit was fixed with System Menu version 7.0.0-13.

Latest revision as of 12:31, 22 October 2016

MSET exploit
General
Authorichfly, GateWay

The MSET exploit is an exploit for the System Settings application of the Nintendo 3DS (MSET). The vulnerability was originally discovered by ichfly in 2012, and was later used by the GateWay 3DS. The exploit uses a flaw in the Nintendo DS profile settings, where a long nickname or message will cause a stack buffer overflow, crashing the 3DS part of the console.

The vulnerability used by this exploit was fixed with System Menu version 7.0.0-13.