A kernel remote code execution exploit for PlayStation 4 up to firmware 11.00 via PPPoE.
PPPwn is a kernel remote code execution exploit for PlayStation 4 consoles that leverages a PPPoE vulnerability (CVE-2006-4304) to run arbitrary code on the system. It allows users to execute custom payloads, such as homebrew enablers, on supported firmware versions up to 11.00. The exploit works by intercepting and manipulating PPPoE network connections between a computer and the PS4.
Security researchers, PlayStation 4 homebrew developers, and enthusiasts interested in console hacking and firmware exploitation. It requires technical knowledge of networking, Linux, and exploit development.
PPPwn provides a reliable, open-source kernel RCE exploit for a wide range of PlayStation 4 firmware versions, with clear documentation and extensible payload support. It stands out for its detailed logging and community-driven firmware compatibility updates.
PPPwn - PlayStation 4 PPPoE RCE
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Supports PlayStation 4 firmware versions from 7.00 to 11.00 with detailed lists, and encourages community updates via PRs for more versions.
Provides verbose output during each stage (e.g., STAGE 0 to 4) as shown in the example run, aiding in debugging and understanding the exploit process.
Allows adaptation of the stage2.bin payload for launching custom homebrew enablers like Mira, enabling users to build upon the proof-of-concept foundation.
Leverages CVE-2006-4304 that was reported responsibly to PlayStation, ensuring ethical security research and community trust.
Requires a Linux system, physical Ethernet connection, specific PS4 network configuration (PPPoE), and manual compilation steps, making it inaccessible for casual users.
The included payload only prints 'PPPwned' on the PS4; users must manually adapt stage2.bin for practical homebrew applications, adding extra development overhead.
Does not natively support Mac Apple Silicon—requires Docker or Linux VM workarounds—and relies on Ethernet ports, which may not be available on modern laptops.