Jump to content

Self-referential control character abuse: Difference between revisions

No edit summary
 
Line 9:
*The 0x52 control character (player's name) can be included within the player's own name, resulting in an infinite loop.
*The same applies with the 0x53 control character (rival's name) if facing the rival.
*In Generation II, 0x3F is an enemy control character, including their Trainer class. In [https://xcellerator.github.io/posts/tetsuji/ ana Remote Code Execution exploit by Tetsuji] this is written to wOTClassName ($C64C). The later occurrence of another 0x3F at $D29C leads to a recurrence (and stack overflow); the program counter falls into WRAM for [[arbitrary code execution]] after executing ret with the stack pointer in locked SRAM. However, pfero is skeptical if this would work on real hardware because of difficult to predict open bus behavior.
*An exploit similar to the infinite player's name may be possible with <PLAY_G>, PlaceGenderedPlayerName in Pokémon Crystal.
*An exploit may potentially be possible with a [[mobile script]] (0x15) in (Japanese) Pokémon Crystal.
Cookies help us deliver our services. By using our services, you agree to our use of cookies.