The developer known as goakal-play has built a custom version of a host server for the umtx2 exploit , intended to run on STB (Set-Top Box) devices or Armbian-based operating systems, with the intent of jailbreaking the PlayStation 5 in local or offline environments.

The umtx2 exploit , at the core of the project, exploits the CVE-2024-43102 vulnerability in the console WebKit to gain access to the kernel and allow the execution of unsigned code, such as homebrew payloads or debugging tools.
Unlike the original idlesauce repository , which focused on using the exploit via PS5 browsers or sites hosted on Cloudflare, this implementation is optimized for alternative server environments, such as embedded devices or single-board computers, including the Raspberry Pi .
The goal is to provide a self-contained, internet-independent solution that is useful for those who want a permanent or private setup.
The server is probably inspired by the umtx2host.py file , but has been properly adapted for the STB/Armbian device architecture.
It includes a local HTTP script that can deliver the exploit to the console, along with an ELF loader running on dedicated ports (such as 9020), which is needed to send payloads to the PS5.
Characteristics
- Automatically start the server at boot via systemd.
- DNS Spoofing and Rebind Attack Management .
- HTTP support for the esphost app and HTTPS for redirecting from the PS5 user guide menu.
- Lightweight and optimized for STB devices.
Note: This project requires the STB (Set-Top Box) device to be rooted first. After rooting, you need to properly install Armbian before proceeding with the configuration .
Configuration
Installing dependencies
sudo apt update sudo apt install dnsmasq hostapd net-tools -y
Cloning the idlesauce repository
git clone https://github.com/idlesauce/umtx2.git umtx2/ wget https://raw.githubusercontent.com/goakal-play/ps5-umtx2-server-stb/main/custom_host.py -P umtx2/
Arrestare systemd-resolved per evitare conflitti con il DNS personalizzato
sudo systemctl stop systemd-resolved sudo systemctl disable systemd-resolved
Creare un servizio systemd per assegnare un IP statico
cat << 'EOF' | sudo tee /etc/systemd/system/static-ip.service > /dev/null [Unit] Description=Set Static IP Address and restart services After=network-online.target hostapd.service Wants=network-online.target [Service] Type=oneshot ExecStart=/usr/local/bin/set-static-ip.sh RemainAfterExit=yes [Install] WantedBy=multi-user.target EOF
Creare uno script IP statico eseguito dal servizio sopra
cat << 'EOF' | sudo tee nano /usr/local/bin/set-static-ip.sh > /dev/null
#!/bin/bash
for i in {1..10}; do
if ip link show wlan0 > /dev/null 2>&1; then
break
fi
sleep 1
done
ip link set wlan0 up
ifconfig wlan0 10.1.1.1 netmask 255.255.255.0 up
systemctl restart hostapd
systemctl restart dnsmasq
EOFRenderlo eseguibile e abilitare il servizio
sudo chmod +x /usr/local/bin/set-static-ip.sh sudo systemctl daemon-reload sudo systemctl enable static-ip.service sudo systemctl start static-ip.service
Configurazione Hostapd (punto di accesso WiFi)
cat << 'EOF' | sudo tee nano /etc/hostapd/hostapd.conf > /dev/null interface=wlan0 ssid=PS5_UMTX2 hw_mode=g channel=6 auth_algs=1 wpa=2 wpa_passphrase=12345678 wpa_key_mgmt=WPA-PSK rsn_pairwise=CCMP EOF
Collega il file di configurazione Hostapd
cat <<EOF | sudo tee /etc/default/hostapd > /dev/null DAEMON_CONF="/etc/hostapd/hostapd.conf" EOF
Abilita e avvia Hostapd
sudo systemctl unmask hostapd sudo systemctl enable hostapd sudo systemctl restart hostapd
Configurazione dnsmasq (DHCP e DNS)
cat << 'EOF' | sudo tee /etc/dnsmasq.conf > /dev/null interface=wlan0 bind-interfaces port=0 dhcp-range=10.1.1.2,10.1.1.9,7d dhcp-option=3,10.1.1.1 dhcp-option=6,10.1.1.1 bogus-priv no-resolv no-hosts no-poll log-dhcp log-queries EOF
Riavvio del servizio dnsmasq
sudo systemctl restart dnsmasq
Servizi Systemd per custom_host.py (Server)
cat << 'EOF' | sudo tee /etc/systemd/system/ps5-host.service > /dev/null [Unit] Description=PS5 Exploit Host After=network.target [Service] ExecStart=/usr/bin/python3 /root/umtx2/custom_host.py WorkingDirectory=/root/umtx2 Restart=always User=root [Install] WantedBy=multi-user.target EOF
Servizi Systemd per FakeDNS
cat << 'EOF' | sudo tee /etc/systemd/system/fakedns.service > /dev/null [Unit] Description=Fake DNS Server After=network.target [Service] ExecStart=/usr/bin/python3 /root/umtx2/fakedns.py -c /root/umtx2/dns.conf WorkingDirectory=/root/umtx2 Restart=always [Install] WantedBy=multi-user.target EOF
Cambia l’IP predefinito di dns.conf in IP STB statico
cat << 'EOF' | sudo tee /root/umtx2/dns.conf > /dev/null A manuals.playstation.net 10.1.1.1 EOF
Abilita e avvia tutti i servizi
sudo systemctl daemon-reexec sudo systemctl daemon-reload sudo systemctl enable ps5-host.service sudo systemctl enable fakedns.service sudo systemctl start ps5-host.service sudo systemctl start fakedns.service
Riavvia il sistema
sudo reboot
Controlla lo stato del servizio
sudo systemctl status ps5-host.service sudo systemctl status fakedns.service sudo systemctl status dnsmasq.service sudo systemctl status static-ip.service
Download: PS5 UMTX2 Exploit Host Server (STB/Armbian)
Fonte: x.com
Dịch Vụ Chép Game Tại TP.HCM – Hỗ Trợ Tất Cả Quận
Chép Game Ổ Cứng Ngoài Giá Rẻ – Hỗ Trợ PS, Xbox, Nintendo, PC
Dịch Vụ Chép Game PSP Giá Rẻ – Game Việt Hóa Cập Nhật Mới Nhất
Dịch Vụ Chép Game PSVITA Giá Rẻ – Game Việt Hóa Cập Nhật Mới Nhất
Dịch Vụ Chép Game PS2 Giá Rẻ – Game Việt Hóa Cập Nhật Mới Nhất
Dịch Vụ Chép Game NINTENDO SWITCH Giá Rẻ – Game Việt Hóa Cập Nhật Mới Nhất
Dịch Vụ Chép Game PS5 Giá Rẻ – Game Việt Hóa Cập Nhật Mới Nhất
Dịch Vụ Chép Game XBOX 360 Giá Rẻ – Game Việt Hóa Cập Nhật Mới Nhất
Dịch Vụ Chép Game PS3 Giá Rẻ – Game Việt Hóa Cập Nhật Mới Nhất
Dịch Vụ Chép Game PS4 Giá Rẻ – Game Việt Hóa Cập Nhật Mới Nhất
Dịch Vụ Chép Game PC Giá Rẻ – Game Việt Hóa Cập Nhật Mới Nhất
