Do not update past 5.2.0/5.3.0 if you can help it. Unknown if kernel exploit is fixed. Currently, we have a userspace exploit that can be compiled and run via the Internet Browser. It currently works on versions 4.0.0 to 5.1.0. This isn't very useful at all for anyone who isn't a developer. All it allows is basic access to reading and writing certain parts of memory (assuming it isn't protected) and basic library functions. We can't access the filesystem or likewise install or change anything on it. You have to run the exploit every time you want to do something. You can find the exploit here. Frequently Asked Questions Q: How do I install the Homebrew Channel? A: Wrong place to be looking, you're thinking of the sandboxed vWii (virtual Wii). For more info go here and here. Q: What is this? A: As mentioned before, it's an exploit that uses a bug in the (very old) version of WebKit that Nintendo is using for the Internet Browser. Q: Why doesn't it work on anything after 5.1.0? A: We only ever found and developed one bug, and (I assume) Nintendo caught wind of the bug and patched it in 5.1.1. We would have to find another one that would lead to being able to manipulate the memory to be able to do anything more. Q: What's the latest version the exploit works on? A: See above answer, it works on 4.0.0 through 5.1.0, and there are 3 separate versions for 4.0.X 4.1.0 and 5.X. It was first made for 4.1.0 and then later back-ported to 4.0.X, since some addresses had changed. Later, the update that added the Quick Boot Menu (5.0.0) changed the code structure enough that we had to blindly find our addresses again and rebuild the ROP chain to get code execution again. Q: I don't want to miss out on potential homebrew, how should I update to a safe version? A: The recommended way is to use the disc version of Mario Kart 8 which comes with 4.1.0. Make sure your Wii U can't access the internet and then run the game and have it update with the data on the disc. Q: I want to update to the latest version but I don't want to miss out, am I safe in doing so? A: NO. Do not update past 5.3.0 if you can help it. Q: I haven't heard anything in a while, when can we expect to see progress? A: Everybody who has the ability to work on the kernel exploit or find and exploit a new bug is busy with school, so progress has been slow. Nothing has been cancelled, only that nobody's had any time to work on it. As for when you might hear something, probably sometime in December, since most of us get "Winter Break" to transition between semesters. Q: Since the exploit is broken in the latest version, what are you going to do now? A: Finish it, of course. Just because it doesn't work on the latest version doesn't mean we're going to give up. It's still useful and usable on quite a few versions. We finish what we start.