

“Unfortunately, this bug affects a significant number of Tegra devices beyond the Switch, and beyond even the X1 included in the Switch,” she wrote. Katherine Temkin, who reported the vulnerability on Github, wrote on her personal site that NVIDIA and other vendors, Nintendo included, were notified of the vulnerability ahead of its public disclosure. For new devices, the correct solution is likely to introduce an new ipatch or new ipatches that limits the size of control request responses.

It is suggested that consumers be made aware of the situation so they can move to other devices, where possible.
HOMEBREW SWITCH UPDATE
Unfortunately, access to the fuses needed to configure the device’s ipatches was blocked when the ODM_PRODUCTION fuse was burned, so no bootROM update is possible.

Developed by one of the members behind ReSwitched, a community site designed to document the Switch’s processes and enable the development of homebrew software, the exploit allows a user to execute code on the Tegra chip’s boot and power management processor before a fuse kicks in.
