https://github.com/zoogie/unSAFE_MODE/releases
Zoogie delights us with a new 3DS exploit for the recovery mode of the 3DS, which also works on the current firmware! This shortens the installation process for boot9strap somewhat.
If the 3DS is to be updated via the recovery menu (SAFE_MODE) and an Internet connection cannot be established, the Internet settings in SAFE_MODE are forwarded to. If the proxy settings are edited here for a connection, the URL is not checked for length, which can be exploited with the help of prepared settings.
The system updater in SAFE_MODE is actually a fork of MSET (the system settings) of firmware 1.0. MSET also had this error in the past, but only up to firmware 3.0. Since Nintendo doesn't update SAFE_MODE often for some reason, this bug has never been fixed there. If that sounds familiar, safehax used a company launch bug that was fixed before, but never in SAFE_MODE.
To do this, of course, the Wi-Fi settings must be specially edited, which is possible, for example, using bannerbomb3. As is so often the case in the 3DS scene, the documentation is rather moderate and often only with a reference to 3ds.hacks.guide. Instructions are included, however seed miners must be run beforehand and movable.sed must be obtained. Alternatively, you can also use PicHaxx with a special Otherapp payload.
https://wiidatabase.de/unsafe_mode-v1-0-neuer-3ds-exploit-zur-installation-von-boot9strap/
(German Page).
Thank you very much @zoogie
Zoogie delights us with a new 3DS exploit for the recovery mode of the 3DS, which also works on the current firmware! This shortens the installation process for boot9strap somewhat.
If the 3DS is to be updated via the recovery menu (SAFE_MODE) and an Internet connection cannot be established, the Internet settings in SAFE_MODE are forwarded to. If the proxy settings are edited here for a connection, the URL is not checked for length, which can be exploited with the help of prepared settings.
The system updater in SAFE_MODE is actually a fork of MSET (the system settings) of firmware 1.0. MSET also had this error in the past, but only up to firmware 3.0. Since Nintendo doesn't update SAFE_MODE often for some reason, this bug has never been fixed there. If that sounds familiar, safehax used a company launch bug that was fixed before, but never in SAFE_MODE.
To do this, of course, the Wi-Fi settings must be specially edited, which is possible, for example, using bannerbomb3. As is so often the case in the 3DS scene, the documentation is rather moderate and often only with a reference to 3ds.hacks.guide. Instructions are included, however seed miners must be run beforehand and movable.sed must be obtained. Alternatively, you can also use PicHaxx with a special Otherapp payload.
https://wiidatabase.de/unsafe_mode-v1-0-neuer-3ds-exploit-zur-installation-von-boot9strap/
(German Page).
Thank you very much @zoogie