Somebody posted the exact same thing yesterday. Here is my reply.
In other words, this is just sensationalist bullshit. Projects like http://www.breaknenter.org/projects/inception/ use DMA attacks against the host because FireWire protocol uses DMA. USB 3.0 also has support for DMA, but I'm pretty sure nobody has attempted a DMA attack with USB 3.0 and I don't think the Wii U even has USB 3.0 ports.
STOP.POSTING.THIS.BULLSHIT. We are all sick of it. Read the top comment here:
http://www.reddit.com/r/netsec/comments/2c9otm/badusb/
Relys said:Yeah buddy this has nothing to do with an exploit vector into the Wii U through USB. What you would be looking for is an exploit in the USB host, not the USB controller.
You can already purchase the device you describe. It's called a USB Rubber Ducky.
https://hakshop.myshopify.com/products/usb-rubber-ducky-deluxe
To me it looks like it's just about creating your own Rubber Ducky type device from any USB Controller by overwriting the micro controller. This is all that your post is describing. This has nothing to do with the Wii U or finding an exploit in the Wii U USB host at all.
Can you please close this thread?
In other words, this is just sensationalist bullshit. Projects like http://www.breaknenter.org/projects/inception/ use DMA attacks against the host because FireWire protocol uses DMA. USB 3.0 also has support for DMA, but I'm pretty sure nobody has attempted a DMA attack with USB 3.0 and I don't think the Wii U even has USB 3.0 ports.
STOP.POSTING.THIS.BULLSHIT. We are all sick of it. Read the top comment here:
http://www.reddit.com/r/netsec/comments/2c9otm/badusb/