(vuln was never fixed, the application was just never updated (because it was assumed to be fixed at the time)) |
(link to nimhax) |
||
Line 14: | Line 14: | ||
The first version released on March 22, 2016.<ref>https://github.com/yellows8/ctr-httpwn/releases/tag/v1.0</ref> | The first version released on March 22, 2016.<ref>https://github.com/yellows8/ctr-httpwn/releases/tag/v1.0</ref> | ||
Nintendo released [[3dbrew:11.4.0-37|11.4.0-37]] on April 10, 2017. The ctr-httpwn application stopped working, but the vulnerability was not actually fixed. | Nintendo released [[3dbrew:11.4.0-37|11.4.0-37]] on April 10, 2017. The ctr-httpwn application stopped working, but the vulnerability was not actually fixed. An example of the exploit working on 11.4 and later is [https://github.com/luigoalma/nimhax nimhax]. | ||
== References == | == References == | ||
<references/> | <references/> |
Revision as of 03:11, 13 August 2022
This software is old and outdated. It will likely never see an update again, and people may be unable to provide support if you use it. |
This page is a work in progress. |
Developer(s) | yellows8 |
---|---|
Console | Nintendo 3DS |
Version | v1.2 |
Links | |
GitHub | yellows8/ctr-httpwn |
ctr-httpwn is an exploit for the HTTP system module. It was mainly used to prevent the console from seeing and downloading new system updates, before the advent of easily-accessible custom firmware.
History
The first version released on March 22, 2016.[1]
Nintendo released 11.4.0-37 on April 10, 2017. The ctr-httpwn application stopped working, but the vulnerability was not actually fixed. An example of the exploit working on 11.4 and later is nimhax.