Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Softmod
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===PlayStation 4=== The [[PlayStation 4]] has ways to achieve a softmod. Most require a userland exploit as the entry point, which can be either [[WebKit]] vulnerabilities in the PS4 Web Browser, or a savegame exploit. All models of PS4 can be softmodded. They are all tether exploits meaning they have to be performed every time the console is powered on, although some exploits may be persisted using rest mode. Softmodding a PS4 allows for homebrew, loading game backups, bypass region checks, and change fan and CPU/GPU speeds. Some payloads can boot the PS4 into a [[Linux distribution]], although this is not permanent and the console will revert to Orbis OS on reboot. Known firmware versions that allow for a softmod are: 1.76,<ref>{{Cite news|url=https://thehackernews.com/2015/12/sony-ps4-playstation-jailbreak.html|title=Hacker Confirms PlayStation 4 Jailbreak! Exploit Could Open Doors for Pirated Games|website=The Hacker News|date=14 December 2015|access-date=29 August 2024|archive-date=|archive-url=}}</ref> 4.05,<ref>{{Cite news|url=https://thehackernews.com/2017/12/ps4-jailbreak-kernel-exploit.html|title=Kernel Exploit for Sony PS4 Firmware 4.05 Released, Jailbreak Coming Soon|website=The Hacker News|date=27 December 2017|access-date=29 August 2024|archive-date=|archive-url=}}</ref><ref>{{cite web|title=Cryptogenic/PS4-4.05-Kernel-Exploit|website=[[GitHub]]|url=https://github.com/Cryptogenic/PS4-4.05-Kernel-Exploit|accessdate=29 August 2024}}</ref> 4.74, 5.05/5.07,<ref>{{cite web|title=Cryptogenic/PS4-5.05-Kernel-Exploit|website=[[GitHub]]|url=https://github.com/Cryptogenic/PS4-5.05-Kernel-Exploit|accessdate=29 August 2024}}</ref> 6.72,<ref name="ps4jb-6.72">{{cite web|title=sleirsgoevy/ps4jb|website=[[GitHub]]|url=https://github.com/sleirsgoevy/ps4jb|accessdate=29 August 2024}}</ref> 7.02,<ref>{{cite web|title=sleirsgoevy/PS4-webkit-exploit-7.02|website=[[GitHub]]|url=https://github.com/sleirsgoevy/PS4-webkit-exploit-7.02|accessdate=29 August 2024}}</ref> 7.55,<ref>{{cite web|title=sleirsgoevy/ps4jb2 at 75x|website=[[GitHub]]|url=https://github.com/sleirsgoevy/ps4jb2/tree/75x|accessdate=29 August 2024}}</ref> 9.00,<ref name="ps4jb-9.00">{{cite web|title=ChendoChap/pOOBs4|website=[[GitHub]]|url=https://github.com/ChendoChap/pOOBs4|accessdate=29 August 2024}}</ref> 11.00,<ref name="ps4jb-11.00">{{cite web|title=TheOfficialFloW/PPPwn|website=[[GitHub]]|url=https://github.com/TheOfficialFloW/PPPwn|accessdate=29 August 2024}}</ref> 12.02.<ref name="ps4jb-12.02-ps5jb-10.01">{{cite web|title=Al-Azif/psfree-lapse|website=[[GitHub]]|url=https://github.com/Al-Azif/psfree-lapse|accessdate=13 May 2025}}</ref> It is worth noting the 9.00 exploit requires inserting a specially crafted [[USB flash drive]] into the console, and the 11.00 exploit to connect to a malicious [[Point-to-Point Protocol over Ethernet|PPPoE]] server over the [[Computer network|network]].
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)