Team Twizzers , who signed a new exploit on the Wii this morning, hitting a second time today but this time on the Nintendo DS. Indeed Twizere Team has managed to run unsigned code from the SD slot of our dear DSi by exploiting a flaw in the game Sudoku DSiware .
Usage of the exploit is described below:
1. Export Sudoku to SD card via the data management menu.
2. Sudokuhax will then be injected into the Sudoku application via client software. The client software uploads DSi-specific data from the Sudoku application to a web server, then injects the retrieved data into the Sudoku application.
3. Copy the output binary to SD card with the same filename as the original.
4. Copy Sudokuhax from SD card to “internal memory” via the data management menu.
5. Launch Sudoku, then press button A or touch screen at the Sudoku title screen.
6. Now boot.nds on SD card will be run.
The data uploaded by the client software includes the anonymous DSi-unique console ID, and other data required for modifying the Sudoku binary on SD card. This data is used for logging unique web server requests.