PS5: PSFree integrated with kexploit for 3.xx/4.xx, improves speed and stability to run the PS5 Jailbreak
Scene developer idlesauce has published a PSFree implementation combined with the PS5 Kernel exploit for 3.xx/4.xx. PSFree is a stable and fast webkit exploit: if you’ve been having troubles with the stability of the PS5 Jailbreak, this version could significantly help by being faster and generally more reliable.
Note: for those of you running on PS4 9.00, a similar implementation was released for the PS4 Jailbreak.
If you’re looking for a Jailbreakable PS5:
Disclaimer: ebay links in this section are affiliate links. As an eBay partner, I may be compensated if you make a purchase.
You’re looking for a PS5 with Firmware 4.51 or lower. Major retailers don’t sell those anymore, so you want to buy second-hand (eBay or equivalent).
- Hunt for either a “new in box” Launch Edition PS5 or “new in box” CFI-10xx (CFI-10xx are what you’re looking for, CFI-11xx are risky, CFI-12xx are no go),
- Look for a used PS5 console where the seller can explicitly confirm the firmware. Sometimes searching for the exact firmware, e.g. PS5 4.03 can yield results. Always double check!!!
What is PsFree for PS4/PS5
PsFree is a (work in progress) webkit exploit for PS4 firmwares 6.00 to 9.60, and for PS5 1.00 to 5.50. It is based on CVE-2022-22620 by security researchers Sergei Glazunov and Maddie Stone.
A webkit exploit, in the context of PS4/PS5 hacking, is a usermode exploit. It allows limited access to run unsigned code on the console. While in theory it could be used to run homebrew games, in practice such exploits are typically used as entry points or attack vectors for privilege escalation (aka kernel exploits). In other words, a usermode exploit such as this one is usually not very useful on its own for the end user, but once combined with a kernel exploit, can lead to a Jailbreak of the console.
There are kernel exploits publicly available on the PS4 (up to firmware 9.00) and PS5 (up to Firmware 4.51) as of this writing. Although these kernel exploits are already used in combination with other usermode entry points, the benefits of this webkit exploit are as follows:
- On firmwares with an existing entry point/kernel exploit combination, it could be used to replace the existing exploit, possibly offering a more stable implementation (which is what’s happening here for PS5 up to 4.51)
- On firmwares that do not yet have a kernel exploit, it can be used as an entry point in the future, once such kernel exploits are found. For security researchers, it also provides a ready-to use entry point to dig further into the machines
The PS4/PS5 version was implemented by abc
Test PSFree + PS5 Kernel Exploit
You can point your PS5’s browser to https://ps5jb.pages.dev/ in order to test the exploit (using a DNS redirection as usual)
To self host:
If you can, I recommend you instead “self host” the exploit, by getting the sources here: https://github.com/idlesauce/PS5-Exploit-Host
- Tutorial: download and run the PS5 4.03/4.50/4.51 exploit (Webkit version)
- Alternatively: run the exploit on an ESP2866
Source: Thanks to Boris for the tip!