While we are all focused on E3, developer Marionumber1 released a userland exploit for Wii U triggered by the web browser. This Wii U hack lets you run unsigned userland code.

Wii U hack released

If you are following us and you didn’t update your Wii U to the latest 5.4.0 firmware, your Wii U is vulnerable for this exploit. The libwiiu repository makes it possible to compile C code, embed it inside a webpage then execute it via the web browser on Wii U. At this point, this is mostly aimed for developers and not end users but expect more soon.
<img class="wp-image-26836 size-full" src="http://wololo.net/wagic/wp-content/uploads/2015/06/fotoğraf-3.jpg" alt="Wii U hack - Taken from my 4.0.2 Wii U. Script is premade so don't mind the 5.3.2 there." width="1632" height="1224" />Taken from my 4.0.2 Wii U. Script is premade so don’t mind the 5.3.2 there.

Right now this Wii U hack can be used on firmwares 3.x.x, 4.0.x, 4.1.0, 5.0.0, and 5.1.0 according to the Readme file on the repository though it is confirmed the vulnerability is there on 5.3.2 too. There is still ongoing work for the 5.3.2 firmware. The exploit is not compatible for 5.4.0 firmware users though.
As this is a userland exploit, backup loaders or any modification that requires kernel level access is not possible.
What do you think about this new exploit? Please share your ideas in the comment section below.
Source, Readme, Full Credits and more info at libwiiu repository
Also special thanks to user Adr990 at gbatemp.net to host a website so that i could try the “Hello World” myself on my Wii U.

http://wololo.net/2015/06/17/wii-u-n...hack-released/