@qwertyoruiopz - that's just how it goes - Uses a modified Pegasus 64-bit iOS v9.3 Webkit Exploit to get into the Switch!That's just how it goes! - Is all basically @qwertyoruiopz stated after it Tweeted the above picture, and now he has caused a whirlwind of posters on his Twitter, asking him questions, and trying to figure out more, but basically Nintendo has left a 'huge hole' in their hidden web browser used to authorize your access onto WiFi HotSpots and to link your Twitter/Facebook accounts to your Switch profile, and @qwertyoriopz figured out with a few simple changes to the address offsets of the Pegasus 64-bit iOS v9.3 Webkit Exploit used by La Pangu team on their JBME website that Apple of course quickly blocked, he was able to get into the first stage of 'userland area' on the Switch.
Even tho Apple blocked the JBME web browser exploit used, it seems Nintendo has not, and with little bit of quick work, @qwertyoruiopz was able to use the old La Pangu webkit hijacking trick to quickly get into the Nintendo Switch userland area.
Now of course jumping from 'userland' to kernel is another matter, but its a step in the right direction, and the same process occurred on the Nintendo 3DS and Wii U with their many versions of exploits using the webkit holes, so it will only be a matter of time before the rest of pieces fall into place, but of course this will be cat&mouse game, Nintendo already released an day 1 firmware update for Switch, and we are sure to see many more firmware updates over the coming weeks and months, so for now it might be best to keep your Switch on the current v2.0.0 firmware, and disable any background updating of its system software, until we know more.
NEWS SOURCE: @qwertyoruiopz (via) Twitter