More actions
Basic information
Display title | MSET9 3DS |
Default sort key | MSET9 3DS |
Page length (in bytes) | 8,046 |
Page ID | 35938 |
Page content language | en-gb - British English |
Page content model | wikitext |
Indexing by robots | Allowed |
Number of redirects to this page | 0 |
Page image |
Page protection
Edit | Allow all users (infinite) |
Move | Allow all users (infinite) |
Edit history
Page creator | HydeWing (talk | contribs) |
Date of page creation | 00:53, 17 October 2023 |
Latest editor | Hyatt (talk | contribs) |
Date of latest edit | 07:02, 17 August 2024 |
Total number of edits | 4 |
Total number of distinct authors | 2 |
Recent number of edits (within past 90 days) | 0 |
Recent number of distinct authors | 0 |
Page properties
Transcluded templates (3) | Templates used on this page: |
SEO properties
Description | Content |
Page title: (title )This attribute controls the content of the <title> element. | (Exploits) - GameBrew |
Title mode (title_mode )More_information | append |
Article description: (description )This attribute controls the content of the description and og:description elements. | MSET9 is a an exploit for the Nintendo 3DS that operates using the ARM9 architecture. It can be initiated by simply adding a specific filename to a SD card inserted into the console. This exploit takes advantage of a vulnerability present in the FSPXI:EnumerateExtSaveData function, which is invoked by MSET to parse 3DS extdata IDs for Data Management. |
Article image: (image )This attribute controls the content of the og:image element. This image is mostly displayed as a thumbnail on social media. | |
Image alternative text: (image_alt ) | MSET9 |