Feeds

Wii U 'has been JAILBROKEN' via legacy games, say homebrewers

Backwards compatible with backdoors

The Power of One Infographic

A squad of techies claim they've cracked Nintendo's anti-piracy defences in the Wii U days after the games console hit US shelves.

The hack, the gaming equivalent of jail-breaking, allows home-made games, pirate copies of titles and other unauthorised software to run on the Wii U, according to wiiuhacks.com. The attack appears to involve exploiting security holes in old Wii games when a Wii U is running in legacy Wii mode.

The team has compiled a list of authorised games that can be hijacked to launch unofficial titles.

The group has also produced a seven-minute video of what appears to be a Wii U playing homebrew games after running the "Smash Stack" exploit from a disc. Nintendo, like other console makers, locks down its machines so, in theory, they can only play cryptographically signed software; hackers usually have to exploit security holes in the system or endorsed games to defeat these protections.

Chris Boyd AKA PaperGhost, a senior threat researcher at GFI Software and an expert in gaming security, said major Wii homebrew communities such as wiiubrew.org are yet to hack the Wii U.

"We have not been successful in running homebrew on the Nintendo Wii U. But running code in Wii Mode is possible," wiiubrew.org stated.

"It's the same story elsewhere, even on sites with dedicated modding and homebrew sections," according to Boyd.

He added that it's one thing to get old exploits working in legacy Wii mode, but another to develop exploits for vulnerabilities exclusively present in new Wii U systems. He is cautious of the wiiuhacks.com team's boasts.

"There is one video on YouTube where the uploader claims to be successfully running homebrew on the Wii U using an older exploit designed to load unauthorised code on the original Wii console, but I've no way of verifying if the video is genuine," Boyd told El Reg.

"Additionally, there are groups picking through the back catalogue of programs and exploits from the original Wii - some of which no longer work on certain versions of system menu - to see if they can uncover a blind spot in the new console."

The Wii U console is backwards compatible with most Wii games and accessories, which explains why older exploits for the previous console still work, up to a point, on the next-generation machine.

Nintendo pushed a firmware update to Wii U consoles less than a day after the system went on sale on Sunday in the US. The sizeable upgrade does not block the Wii U Smash Stack exploit, but future updates could, wiiuhacks.com warned. Attempts to interrupt the lengthy Wii U update process once it starts can leave the console as useful as a squishy brick, as Nintendo itself advised. ®

Top three mobile application threats

More from The Register

next story
NEW Raspberry Pi B+, NOW with - count them - FOUR USB ports
Composite vid socket binned as GPIO sprouts new pins
Child diagnosed as allergic to iPad
Apple's fondleslab is the tablet dermatitis sufferers won't want to take
Microsoft takes on Chromebook with low-cost Windows laptops
Redmond's chief salesman: We're taking 'hard' decisions
For Lenovo US, 8-inch Windows tablets are DEAD – long live 8-inch Windows tablets
Reports it's killing off smaller slabs are greatly exaggerated
Seventh-gen SPARC silicon will accelerate Oracle databases
Uncle Larry's mutually-optimised stack to become clearer in August
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.