UDPIH: USB Host Stack exploit + Recovery Menu

It's been a while without any major exploits in the Wii U scene, so I present to you:

USB Descriptor Parsing Is Hard (UDPIH)

An exploit for the Wii U's USB Host Stack. Pronounced like "mud pie" without the M.

The write-up can be found here!

What does this mean?​

Since the USB Stack is running before anything on the PPC side of the Wii U is booted, this allows unbricking things like CBHC bricks without any soldering!


Requirements​

  • A Wii U
  • One of the devices listed below
    Note: Any other linux device capable of USB device emulation should work as well.
    Prebuilt releases are only available for the Pico and Zero.
    I will add more devices below which are confirmed to work.

Supported devices:​

  • A Raspberry Pi Pico or Zero
  • A Nintendo Switch capable of running udpih_nxpayload

Instructions​

Pico​

  • Download the latest udpih.uf2 from the releases page.
  • Hold down the BOOTSEL button on the board and connect the Pico to your PC.
    Your PC will detect the Pi as a storage device.
  • Copy the .uf2 file to the Pico. It will disconnect after a few seconds.
The Pico is now flashed and can be used for udpih. Continue with "Booting the recovery_menu" below.

Raspberry Pi Zero (Linux)​

  • Install the required dependencies:
    Bash:
    sudo apt install build-essential raspberrypi-kernel-headers
  • Clone the repo:
  • Bash:
    git clone https://github.com/GaryOderNichts/udpih.git
    cd udpih
  • Download the latest arm_kernel.bin.h from the releases page and copy it to the arm_kernel directory.
  • Now build the kernel module:
  • Bash:
    cd linux
    make
  • You can now run sudo insmod udpih.ko to insert the kernel module into the kernel.
The Zero is now ready to be used for udpih.
Note that you'll need to insert the module again after rebooting the Zero. You will need 2 USB cables, one for powering the Zero and one which can be connected to the Wii U.

Continue with "Booting the recovery_menu" below.

Booting the recovery_menu​

warning
Important notes for this to work:
  • Make sure no other USB Devices are attached to the console.
  • Only use USB ports on the front of the console, the back ports will not work.
  • If your console has standby mode enabled, pull the power plug and turn it on from a full coldboot state.
  • Copy the latest release of the recovery_menu to the root of your FAT32 formatted SD Card.
  • Insert the SD Card into the console and power it on.
  • As soon as you see the "Wii U" logo on the TV or Gamepad plug in your Zero/Pico.
    This timing is important. If you're already in the menu, the exploit won't work..
  • After a few seconds you should be in the recovery menu.
So what's this recovery menu? The recovery menu allows you to fix several bricks:
screenshot

Wii U Recovery Menu

A simple recovery menu running on the IOSU for unbricking.

Options​

Set Coldboot Title
Allows changing the current title the console boots to.
Useful for unbricking CBHC bricks.
Possible options are:
  • Wii U Menu (JPN) - 00050010-10040000
  • Wii U Menu (USA) - 00050010-10040100
  • Wii U Menu (EUR) - 00050010-10040200
On non-retail systems the following additional options are available:
  • System Config Tool - 00050010-1F700500
  • DEVMENU (pre-2.09) - 00050010-1F7001FF
  • Kiosk Menu - 00050010-1FA81000
Dump Syslogs
Copies all system logs to a logs folder on the root of the SD Card.

Dump OTP + SEEPROM
Dumps the OTP and SEEPROM to otp.bin and seeprom.bin on the root of the SD Card.

Start wupserver
Starts wupserver which allows connecting to the console from a PC using wupclient.

Load Network Configuration
Loads a network configuration from the SD, and temporarily applies it to use wupserver.
The configurations will be loaded from a network.cfg file on the root of your SD.
For using the ethernet adapter, the file should look like this:
Code:
type=eth

For using wifi:
Code:
type=wifi
ssid=ssidhere
key=wifikeyhere
key_type=WPA2_PSK_AES

Pair Gamepad
Displays the Gamepad Pin and allows pairing a Gamepad to the system. Also bypasses any region checks while pairing.
The numeric values represent the following symbols: ♠ = 0, ♥ = 1, ♦ = 2, ♣ = 3.
Note that rebooting the system might be required to use the newly paired gamepad.

Install WUP
Installs a valid signed WUP from the install folder on the root of your SD Card.
Don't place the WUP into any subfolders.

Edit Parental Controls
Displays the current Parental Controls pin configuration.
Allows disabling Parental Controls.

Debug System Region
Fixes bricks caused by setting productArea and/or gameRegion to an invalid value. Symptoms include being unable to launch System Settings or other in-region titles.

System Information
Displays info about several parts of the system.
Including serial number, manufacturing date, console type, regions, memory devices...

Credits​

Special thanks to Maschell, rw-r-r-0644, QuarkTheAwesome, vgmoose, exjam, dimok789, and everyone else who contributed to the Wii U scene!
 
Last edited by GaryOderNichts,

MXRD4K1LL4

Well-Known Member
Member
Joined
Jan 17, 2022
Messages
139
Trophies
0
XP
377
Country
Canada
Wait we need a TV too??? Oh nooo the travesty! This is a tragedy!

/s
You don't necessarily need a tv depending on your ressources

It's been a while without any major exploits in the Wii U scene, so I present to you:

USB Descriptor Parsing Is Hard (UDPIH)

An exploit for the Wii U's USB Host Stack. Pronounced like "mud pie" without the M.

The write-up can be found here!

What does this mean?​

Since the USB Stack is running before anything on the PPC side of the Wii U is booted, this allows unbricking things like CBHC bricks without any soldering!


Requirements​

  • A Wii U
  • One of the devices listed below
    Note: Any other linux device capable of USB device emulation should work as well.
    Prebuilt releases are only available for the Pico and Zero.
    I will add more devices below which are confirmed to work.

Supported devices:​

  • A Raspberry Pi Pico or Zero
  • An unpatched Nintendo Switch capable of running udpih_nxpayload

Instructions​

Pico​

  • Download the latest udpih.uf2 from the releases page.
  • Hold down the BOOTSEL button on the board and connect the Pico to your PC.
    Your PC will detect the Pi as a storage device.
  • Copy the .uf2 file to the Pico. It will disconnect after a few seconds.
The Pico is now flashed and can be used for udpih. Continue with "Booting the recovery_menu" below.

Raspberry Pi Zero (Linux)​

  • Install the required dependencies:
    Bash:
    sudo apt install build-essential raspberrypi-kernel-headers
  • Clone the repo:
  • Bash:
    git clone https://github.com/GaryOderNichts/udpih.git
    cd udpih
  • Download the latest arm_kernel.bin.h from the releases page and copy it to the arm_kernel directory.
  • Now build the kernel module:
  • Bash:
    cd linux
    make
  • You can now run sudo insmod udpih.ko to insert the kernel module into the kernel.
The Zero is now ready to be used for udpih.
Note that you'll need to insert the module again after rebooting the Zero. You will need 2 USB cables, one for powering the Zero and one which can be connected to the Wii U.

Continue with "Booting the recovery_menu" below.

Booting the recovery_menu​


  • Copy the latest release of the recovery_menu to the root of your FAT32 formatted SD Card.
  • Insert the SD Card into the console and power it on.
  • As soon as you see the "Wii U" logo on the TV or Gamepad plug in your Zero/Pico.
    This timing is important. If you're already in the menu, the exploit won't work..
  • After a few seconds you should be in the recovery menu.
So what's this recovery menu? The recovery menu allows you to fix several bricks:
screenshot

Wii U Recovery Menu

A simple recovery menu running on the IOSU for unbricking.

Options​

Set Coldboot Title​

Allows changing the current title the console boots to.
Useful for unbricking CBHC bricks.
Possible options are:

  • Wii U Menu (JPN) - 00050010-10040000
  • Wii U Menu (USA) - 00050010-10040100
  • Wii U Menu (EUR) - 00050010-10040200

Dump Syslogs​

Copies all system logs to a logs folder on the root of the SD Card.

Dump OTP + SEEPROM​

Dumps the OTP and SEEPROM to otp.bin and seeprom.bin on the root of the SD Card.

Start wupserver​

Starts wupserver which allows connecting to the console from a PC using wupclient.

Load Network Configuration​

Loads a network configuration from the SD, and temporarily applies it to use wupserver.
The configurations will be loaded from a network.cfg file on the root of your SD.
For using the ethernet adapter, the file should look like this:

Code:
type=eth
For using wifi:

Code:
type=wifi
ssid=ssidhere
key=wifikeyhere
key_type=WPA2_PSK_AES

Displays DRC Pin​

Displays the Gamepad Pin used for pairing the gamepad.
The numeric values represent the following symbols: ♠ = 0, ♥ = 1, ♦ = 2, ♣ = 3.

Install WUP​

Installs a valid signed WUP from the install folder on the root of your SD Card.
Don't place the WUP into any subfolders.

Credits​

Special thanks to Maschell, rw-r-r-0644, QuarkTheAwesome, vgmoose, exjam, dimok789, and everyone else who contributed to the Wii U scene!

If it works with switch, couldn't it work on Wii, or PC? Idk if it can be used the same but
 

GaryOderNichts

Well-Known Member
OP
Member
Joined
Aug 9, 2018
Messages
792
Trophies
1
XP
5,503
Country
Germany
You don't necessarily need a tv depending on your ressources


If it works with switch, couldn't it work on Wii, or PC? Idk if it can be used the same but
I'm going to quote my previous reply to your message:
"you'll need a [...] USB controller [that] can act as a USB device."
The Wii and most PCs are not going to have that.
 

Arck

Well-Known Member
Member
Joined
Mar 13, 2016
Messages
955
Trophies
0
XP
878
Country
The power LED of my WiiU is blinking in blue, I guess it can't be unbricked at all :/ (not sure how I bricked it in the past)
 

MXRD4K1LL4

Well-Known Member
Member
Joined
Jan 17, 2022
Messages
139
Trophies
0
XP
377
Country
Canada
I'm going to quote my previous reply to your message:
"you'll need a [...] USB controller [that] can act as a USB device."
The Wii and most PCs are not going to have that.
Yeah.. I just don't really know what devices have that. Like if a phone can send file with usb c to usb a it would count or needs really like uh another emulation thing.. I'm just really worried because my Wii I got system damaged and bricked after 1 week if usage and I'm looking a lot for my family to have a good summer so sorry everyone if I am asking lot questions but that's it :)
 

ploggy

WAKA! WAKA!
Member
Joined
Aug 29, 2007
Messages
4,820
Trophies
2
XP
7,860
Country
United Kingdom
I guess, but the software is in development and is testing devices I guess so I'd wait like a week for the whole thing finished :)
Oh its not for me personally, I have a Switch and a Zero if I ever needed to use it, I'm just thinking about the lolz using a PSP to exploit a Switch... Handheld - Handheld :D
 

Arck

Well-Known Member
Member
Joined
Mar 13, 2016
Messages
955
Trophies
0
XP
878
Country
Sounds like hardware failure.
sadly yes, I really can't remember how I bricked it. I guess that WiiU is a literal brick. It's the one I use as a support for my Switch and I have a working one so not a big issue, but still unbricking it could have been nice :P
 
  • Like
Reactions: godreborn

MXRD4K1LL4

Well-Known Member
Member
Joined
Jan 17, 2022
Messages
139
Trophies
0
XP
377
Country
Canada
nope just the light blinking in blue when powered on, the monitor can't even find a signal. I can hear the fan but that's about it.
I don't think this software could run, maybe if you had a backup and paste it on the band it could work, but I don't know what you can really actually do
 

lyokohack

Well-Known Member
Member
Joined
Apr 2, 2018
Messages
294
Trophies
0
Age
27
XP
1,049
Country
France
hi i tried with a patched switch and i have this error in udpih_nxpayload under the switch

0x6 0x100 0x0 0x18
Error ...3

and I copy recovery_menu and I have Fat32 in my card
and the exploit doesn't run anymore
 
Joined
Nov 11, 2019
Messages
20
Trophies
0
XP
102
Patched erista units should work. All mariko units use xusb though, which is untested. They might work as well though, I'll have to wait until someone tests it out :P
I tested it with my patched erista and it worked! Thank you very much for your work and your quick answer :)

Just one suggestion: maybe you could disable the option to Reboot to RCM, if a patched Erista unit is detected in a future update (if you plan to do one). If I remember correctly your code is based on hekate and there's also some kind of protection that you can't enable AutoRCM on a patched console. Rebooting to RCM is also disabled in Lockpick_RCM and I think it's a nice feature.
 
  • Like
Reactions: Valery0p

MXRD4K1LL4

Well-Known Member
Member
Joined
Jan 17, 2022
Messages
139
Trophies
0
XP
377
Country
Canada
I tested it with my patched erista and it worked! Thank you very much for your work and your quick answer :)

Just one suggestion: maybe you could disable the option to Reboot to RCM, if a patched Erista unit is detected in a future update (if you plan to do one). If I remember correctly your code is based on hekate and there's also some kind of protection that you can't enable AutoRCM on a patched console. Rebooting to RCM is also disabled in Lockpick_RCM and I think it's a nice feature.
Did the console had hwfly or sx chip? (Just a question)
 

Site & Scene News

Popular threads in this forum

General chit-chat
Help Users
    Xdqwerty @ Xdqwerty: ...