no it is not in 6.X, it was fix in 5.0, somebody lied to you.
It’s interesting that such a vulnerability even exists in mset; apparently, such an approach had been attempted on the DSi and it was not vulnerable to it. Additionally, the crash had been documented on 3Dbrew for a while, and yet somehow the vulnerability is still open to this day (on 6.3. Of course, user mode stack smashes can be achieved through other vectors...)
Yes, the DS profile exploit still works on 6.3. In theory, it could allow for homebrew on 6.3 provided that homebrews are compiled into ROP lists. Also, if another kernel exploit is found, it'll allow 6.3 to run your pirated games (versus if Nintendo patches the DS profile exploit in 6.4+, then even a new kernel exploit would be useless until another Usermode exploit is found. You need both to run unsigned code).
the exploit still works. you can use it with a ROP chain as yifanlu says. it still exists and works. you're confusing working/existing and usable for morons. the latter is not exactly what a hacking section should be focused on
OP knows that there is no usable exploit for 5.0+ systems. The question is whether the ds profile exploit can still be used in case a new kernel exploit is discovered in 6.3. I'll believe that the answer to that question is "yes" unless you have some source saying otherwise.
Yes, the DS profile exploit still works on 6.3. In theory, it could allow for homebrew on 6.3 provided that homebrews are compiled into ROP lists. Also, if another kernel exploit is found, it'll allow 6.3 to run your pirated games (versus if Nintendo patches the DS profile exploit in 6.4+, then even a new kernel exploit would be useless until another Usermode exploit is found. You need both to run unsigned code).
There is no need to theorycraft this exploit as still usable or not when there is a real world example of this exploit in the form of the gateway flashcart and clones, it is the same exploit used by Smea to run his version of emuNAND. These all have the same limitations of the exploit, it is effectively dead on a 3DS firmware of 5.0 or higher a this time.
Your confusing the "exploit still exists" for "exploit still works", these are 2 different things.
makes me remember chickhen for psp, had to run that like 40 times until it worked... haIt is partially blocked, making it no longer 100% of the time exploitable.
You're confusing matters. The "exploit" to which you're referring, used by smea and Gateway, is actually made to exploit more than one vulnerability. Exploiting the first vulnerability gets you access to the user mode, where a second-stage vulnerability is exploited to allow "kernel mode" access. The latter is required for all the patches to the system that smea's "CFW" and Gateway's "Gateway mode" make. The former (user mode) vulnerability still exists in the latest firmware and it is entirely usable. That's all the OP wanted to know.There is no need to theorycraft this exploit as still usable or not when there is a real world example of this exploit in the form of the gateway flashcart and clones, it is the same exploit used by Smea to run his version of emuNAND. These all have the same limitations of the exploit, it is effectively dead on a 3DS firmware of 5.0 or higher a this time.