So rw-r-r-0644 found a boot1 coldboot exploit for the Wii U. Hopefully this will lead to a coldboot executable with out needing to buy a DS game. so once the eShop does go down we will be still have homebrew one way or another.
https://wiiubrew.org/w/index.php?title=Wii_U_System_Flaws&curid=564&diff=2993&oldid=2955
Upon startup, boot1 loads and processes the latest SLC ISFS superblock. Directory entries are parsed using a recursive function without any limitation on recursion depth. A carefully crafted superblock with a sufficient directory depth can be used to overwrite memory preceding the boot1 stack and eventually gain arbitrary code execution. For example, it is possible to redirect FLA's FS device structure pointer to the superblock area, allowing an attacker to point structure's functions to a controlled memory location.
https://wiiubrew.org/w/index.php?title=Wii_U_System_Flaws&curid=564&diff=2993&oldid=2955
It finally happened, rw-r-r-0644 did the impossible and found a boot1 coldboot exploit:https://t.co/p0RrrAXdBe
— Mike Heskin (@hexkyz) April 10, 2021
Amazing job!