<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>What do Nintendo Switch and iOS 9.3 have in common? CVE-2016-4657 walk-through</title>
        <link>https://stream.echo6.co/videos/watch/c81933c4-3864-451f-b150-eb99f5e2188e</link>
        <description>Using the webkit bug CVE-2016-4657 to start hacking the Nintedno Switch. I have taken the first part from qwerty's iOS 9.3 jailbreak and adapt it to the Nintendo Switch. We craft a Uint32Array to get a arbitrary read/write primitive. Demo at 16:19 The basic PoC: https://github.com/LiveOverflow/lo_nintendoswitch/blob/master/poc1.html Phrack article: phrack.org/papers/attacking_javascript_engines.html -=[ ❤️ Support ]=- → per Video: https://www.patreon.com/join/liveoverflow → per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ 🐕 Social ]=- → Twitter: https://twitter.com/LiveOverflow/ → Website: https://liveoverflow.com/ → Subreddit: https://www.reddit.com/r/LiveOverflow/ → Facebook: https://www.facebook.com/LiveOverflow/ -=[ 📄 P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #SecurityResearch #BrowserExploitation #CVE</description>
        <lastBuildDate>Wed, 15 Apr 2026 15:56:20 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>PeerTube - https://stream.echo6.co</generator>
        <image>
            <title>What do Nintendo Switch and iOS 9.3 have in common? CVE-2016-4657 walk-through</title>
            <url>https://stream.echo6.co/client/assets/images/icons/icon-512x512.png</url>
            <link>https://stream.echo6.co/videos/watch/c81933c4-3864-451f-b150-eb99f5e2188e</link>
        </image>
        <copyright>All rights reserved, unless otherwise specified in the terms specified at https://stream.echo6.co/about and potential licenses granted by each content's rightholder.</copyright>
        <atom:link href="https://stream.echo6.co/feeds/video-comments.xml?videoId=c81933c4-3864-451f-b150-eb99f5e2188e" rel="self" type="application/rss+xml"/>
    </channel>
</rss>