Has anyone looked into an SD card swap exploit? Typically the switch refuses to mount the SD card without a reboot, but if you use a cable like this one:
https://www.amazon.com/gp/product/B01F8C0LOO/ref=oh_aui_detailpage_o01_s00?ie=UTF8&psc=1
The switch doesn't know when you've pulled the card. It acts pretty strange. When taking a screenshot, it tries to save it, then fails. But when I removed the card, formatted it, and reinserted it, it would try to save the screenshot and seemed to succeed, but nothing was written to the card. I even went so far as to copy all screenshots from internal memory to the SD card. No errors, but no files on the card either. I don't have any downloaded software saved on the card to see how it behaves then.
But if the switch doesn't know you've swapped cards, might it be possible to swap in a modified application after it's already booted? Even just a small change of code could theoretically be used to hijack the process right?
And if the switch does panic when the card is removed, then what about something like:
https://hackaday.com/2013/09/19/advanced-transcend-wifi-sd-hacking-custom-kernels-x-and-firefox/
The SD card, bewilderingly, mounts the flash memory as R/W to both the host OS (SwitchOS in this case) and the SD card's internal OS, which can be modded to allow SSH or even FTP access. It's bad form of course, but you can overwrite a file without the host OS even being aware of it.