English Русский

READ THIS CAREFULLY BEFORE PROCEEDING

This exploit loads payloads in PLD (.bin) format on PS5 firmware 4.03. Other firmwares and payload formats are NOT supported.

  1. Click on the link that says JB+NETCAT. In about 20 seconds you'll get a popup saying "waiting for payloads". This means that everything has gone well. You can then send your payload to TCP port 9019.
    If something went wrong during the process, you may get an alert saying "Jailbreak failed! Reboot your PS5 and try again.". In this case you must reboot your PS5, preferrably without closing the dialog box.
    If the system hangs for more than a minute (may require more time on slow Internet connections), reboot your PS5 and try again.
    If the system crashes (looks like instant powerdown), press the power button on the PS5 (NOT on the gamepad) until it turns on again, then retry.

This exploit does crash and hang. Sometimes you even have to retry 10 times to get the jailbreak.

Credits: @theflow for vulnerability disclosure, @ChendoChap for userland CFI bypass, @SpecterDev & @ChendoChap for various help

JB+NETCAT