Headline
CVE-2023-35856: GitHub - MikeIsAStar/Mario-Kart-Wii-Remote-Code-Execution: Injects arbitrary code into a client's game.
A buffer overflow in Nintendo Mario Kart Wii RMCP01, RMCE01, RMCJ01, and RMCK01 can be exploited by a game client to execute arbitrary code on a client’s machine via a crafted packet.
Name already in use
A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
1 branch 0 tags
Code
Use Git or checkout with SVN using the web URL.
Open with GitHub Desktop
Download ZIP
Latest commit
Files
Permalink
Failed to load latest commit information.
Type
Name
Latest commit message
Commit time
Mario Kart Wii Remote Code Execution
Injects arbitrary code into a client’s game.
Assembling
powerpc-gekko-as.exe mario_kart_wii_remote_code_execution.S -o mario_kart_wii_remote_code_execution.elf
powerpc-eabi-objcopy.exe -O binary mario_kart_wii_remote_code_execution.elf mario_kart_wii_remote_code_execution.bin
Usage
Branch to the compiled assembly code from the appropriate address. After the assembly code has finished executing, redirect code execution to the instruction following the original branch instruction.
License
GNU General Public License v2.0