Skip to content

A (WIP) Wii U modchip based on OTP eFuse glitching

Notifications You must be signed in to change notification settings

jan-hofmeier/wii_u_modchip

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

30 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

wii_u_modchip

A (WIP) Wii U modchip based on de_Fuse, a flaw in the Wii U's OTP eFuse readout state machine.

How does it work?

A full writeup is available here. However, the short version is as follows:

In order to accommodate eFuse-based JTAG lockout (and due to other considerations), eFuse bits must be buffered into a register file immediately following NRST, before the internal reset can be released. The eFuse sense state machine latches at a rate of 4 bits per cycle, directly off the 27MHz XTALCLK. Every other rising edge, a byte is written into the register file, starting from the least significant byte of the current u32.

An internal counter is used to keep track of the remaining bytes to be read into the register file. While the eFuse register file is reset to zero with NRST, the internal counter is not: By asserting NRST after N bytes have been read, only 0x400-N bytes will be read on the subsequent boot.

By asserting NRST just before the final byte has been read (1830 cycles), all eFuses will read entirely zero, including the JTAG lockout fuse. This allows trivial, unsigned and unencrypted boot1 execution, with no SEEPROM anti-rollback.

NRST waveform

About

A (WIP) Wii U modchip based on OTP eFuse glitching

Resources

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Python 45.6%
  • C 24.8%
  • Verilog 23.8%
  • CMake 4.0%
  • Makefile 1.5%
  • Shell 0.3%