Immediately after Nintendo Switch 2 officially hit the shelves, the hacker community quickly discovered the first vulnerability on this device.
David Buchanan, a user on the social network Bluesky, was the first to publicly disclose details of a Return-Oriented Programming (ROP) exploit at the userland level via a shared library on the system.

As Buchanan explains, the vulnerability allows the program to be manipulated by overwriting the return address to redirect to other code segments, thereby causing the device to perform unintended behaviors. In a real-world test, the hacker used the bug to display custom checkerboard blocks on the device's screen.
However, Buchanan emphasized that this is only an application-level exploit, does not penetrate the operating system kernel and does not provide root access. This means that users cannot "jailbreak" the Switch 2 to run a customized operating system or interfere deeply with the device's software.
The bug's discoverer himself admitted that he couldn't completely prove that this was an exploit and not a YouTube video being played. However, many other developers and modders have confirmed that the vulnerability is real.

Hacker David Buchanan's discovery of a security flaw on the Switch 2 has been confirmed. Photo: Butterfly
Nintendo has long been known for fiercely protecting its intellectual property, and has said it can disable the console if users attempt to modify the Nintendo Account Service. The Switch 2's user terms also explicitly prohibit software tampering.
With the vulnerability discovered just a day after the console's launch, the tech community predicts that it will take more time - possibly weeks, months, or years - to completely bypass Nintendo's protections and create a custom homebrew operating system. At that point, Nintendo's response will be something the entire community will be watching closely.
Source: https://khoahocdoisong.vn/vua-ra-mat-nintendo-switch-2-da-bi-hack-chay-ma-tuy-chinh-post1546568.html
Comment (0)