DNSpresso, a brand new DNS-based exploit for the Wii U gets released
While the Nintendo Switch currently holds the spotlight when it comes to Nintendo consoles, the Wii U is still being held dearly by many as an emulation and homebrew machine, more so due to its unique dual screen feature.
One of the most prominent Wii U scene homebrew developers, @GaryOderNichts, has worked on a brand new exploit for the Nintendo Wii U, which is based on modifying a connection's DNS to launch a payload into the Wii U. The steps to get this new exploit up and running is quite easy to achieve, and here's the exact instructions by released by Gary:
This new method opens up yet another entry for the console (and it's never too much when it comes to console exploits nowadays).Instructions
- Place all files required for booting into your homebrew environment on your SD Card (for example from aroma.foryour.cafe).
- Place a RPX you want to boot on the root of your SD Card and rename it to launch.rpx (for example PayloadFromRPX).
- On your Wii U head over to System Settings -> Internet -> Connect to the Internet and setup a new connection (Recommended!).
- Go to (X) Connection List and select your newly created connection.
- Select Change Settings -> DNS -> Do not auto-obtain.
- Enter 85.215.57.182 as the Primary DNS and select Confirm.
- Press (B) Back and select Connection Test.
Those interested, can also check out the GitHub repository for the exploit, and for the technical savvy people, Gary wrote an in-depth technical write up for the DNS exploit.
DNSpresso release thread
DNSpresso GitHub repository