Welp, me and my main devs can't get our exploit working (and Sony patched it in 13.50 anyway) so disclosure time!
Before we start, exploit name - The Romeo & Joliet Exploit.
So I mentioned about a month ago that me and some devs were working on an exploit, which... kinda flopped, as none of us have enough skills to finish it. Like, we have the Loader (PS4 Homebrew Loader - Alpha Version) and the entrypoint (Vue-After-Free - the code execution part does work on 13.04, despite people stating otherwise) but we don't have enough skills combined to write the exploit itself.
Credits:
SufficientWin8669 - Most of the Loader code, except aesthetics and logs. Potential_Cattle7163 - Finding potential chainability with 7.55´s Karo WebKit-based exploit. Shadowdev-Vita (me) - Finding and documenting the exploit itself, pondered over entrypoints in the beginning stages, aesthetics for PS4 Homebrew Loader - Alpha Version.
The exploit itself (small writeup, we don't have a proof-of-concept):
It is a parsing bug in 13.04´s [RECOVERY] .PUP, in the libarchive library (based originally on CVE-2025-5914) which allows for an overflow using an expandable Unicode filename, to then get code execution, and commit kernel slides, memory corruption, and allow for the swiping of cr_change_uid, while the kernel is ´dizzy’ from the memory corruption.
In turn, this would allow for a jailbreak on firmwares 13.04 and older, which would be pretty cool, if I'm honest.
Bye for now, Shadowdev-Vita.