Join Us and become a Member for a Verified Badge to access private areas with the latest PS4 PKGs.
PS4 Jailbreaking       Thread starter PSXHAX       Start date Jan 17, 2022 at 2:36 AM       16,577       32      
Proceeding the PS4PiZero / PS4RaspberryPi project, PlayStation 4 Scene developer @Shivelight (Twitter) recently made available via Github a pOOBs4 Buildroot Web server and USB emulation project for the PS4 9.00 pOOBs4 Jailbreak Exploit with Orange Pi Zero / Orange Pi Zero LTS support initially and additional boards including Raspberry Pi Zero W / Raspberry Pi Zero 2 W to be added as stock arrives. :geek:

Download: pOOBs4 buildroot (Latest Version) / / GIT

Spoiler: Depreciated

Here are further details from the pOOBs4 buildroot


This repository contains buildroot external tree for building a minimal Linux image to host pOOBs4 web server and emulate its exfathax USB.


Clone the repository and buildroot version 2021.11:
git clone
git clone -b 2021.11 --depth 1 git://
Configure buildroot to use BR2_EXTERNAL tree and start building. Replace <boardname> with your board defconfig available in configs/ directory or from the Supported Board section:
cd buildroot
make BR2_EXTERNAL=../pOOBs4-buildroot/ <boardname>_poobs4_defconfig
The final image is saved here output/images/sdcard.img.

Supported Board

⚠️ If you have a board that is not listed, feel free to contribute! ⚠️

Below is the currently supported board with defconfig ready use.
  • Orange Pi Zero / Orange Pi Zero LTS [ orangepi_zero_poobs4_defconfig ]
  • Raspberry Pi Zero W [ not yet ]
  • Raspberry Pi Zero 2 W [ not yet ]
  • your board?
Note: You need a board with a USB OTG port for exfathax emulation. All boards listed should have a built-in USB OTG port unless stated otherwise.

not yet: I'm willing to build and test, but currently don't have any and still waiting for restock :(


Download the image for your board from the release page or build it yourself. Then write the image to your SD card using dd:
sudo dd if=output/images/sdcard.img of=/dev/sdX bs=4M
Alternatively, you can use:

This section is here to warn you to backup any customization you made or, better yet, fork this repo and do your customization there. Writing image to SD card destroy its existing content.

To update see Installing.


Insert SD card and plug the board into PS4 using the USB OTG port. You don't need another power cable; your board will draw power from PS4. It may take 30 seconds to boot up for the first time. Afterward, it should only take ≤5 seconds.

Note: SuperSpeed USB (USB 3.1 Gen 1), which PS4 uses, has a maximum power output of 5V/0.9A. Consider this.

Connecting PS4 to the board

Follow these steps to connect your PS4 to the board:
  1. On your PS4 go to Settings -> Network -> Set Up Internet Connection -> Use Wi-Fi -> Custom
  2. Select pOOBs4 on the list
  3. When asked for the password, input: 12345678
  4. Now, for each step, select:
    1. IP Address Settings: Automatic
    2. DHCP Host Name: Do Not Specify
    3. DNS Settings: Automatic
    4. MTU Settings: Automatic
    5. Proxy Server: Do Not Use
  5. You are set!
Running the exploit

You can run the actual pOOBs4 exploit either by visiting from the PS4 browser or from Settings -> User's Guide/Helpful Info -> User's Guide. The host is based on Leeful's 9v4 (w/ GoldHEN v2.0b2), slightly modified to use the USB emulation.


Use Payload Guest.

Accessing the board

You can SSH/SFTP to the board using the root user; the board IP is set to (wlan) by default.
The root user does not have a password. You can set a new password if you want using passwd.

Cheers to MSZ_MGS on Twitter and perou64 for the heads up earlier on! 🍻
POOBS4 Buildroot PS4 9.00 Exploit Web Server USB Emulation by Shivelight.png



I've still got an old teensy usb development board from the early PS3 days. Anyone know if these could be used for this PS4 exploit?


Orangepi PC with armbian buster. Quickly tested using nginx, no dnsmasq, no wireless AP. I used a router with no internet connection that act as dhcp server. I think that this should remain a "sandbox" : better to not expose the console.

Needed to upgrade via armbian-config the firmware, but we have a win ;) The exploit is very quick.

The problem now is that my orangepi if about 6 metres away from the Ps4 (lol)




Sorry i can't explain an in depth step by step now, i hope this short steps will be enough. You need to do some manual steps.

As i said, i have used a router and all the devices (Ps4, dev Board) are connected to it. The Board in my case use the ethernet port and is powered by the dc adapter. I didn't use dnsmasq for my quick test, that means that you need to know the dev Board IP to point it from your Ps4.

On the Ps4 so no special steps needed.

First start updating all packages on the dev board: open a terminal and run apt update, then apt upgrade (root privilege).

Once done, again from terminal type armbian-config (hit enter). You should see a menu, pick the option to update.
Reboot once done.

Now you need to install a WebServer, personally i picked nginx. You can follow this tutorial until the test step

Now you need to copy the exploit web pages on the dev Board to be served.

Copy from the repository the html folder from pOOBs4-buildroot/board/poobs4/common/rootfs_overlay/var/www into the Board folder /var/www

Once done you should be able to reach the web page exploit typing the address http://your.devboard.ip.address/html (in my screenshot i renamed the folder to Ps4, if you rename the folder or place to another path you need to modify the path into the file load_mass_storage).

Plug the usb cable on Ps4 and dev board's otg port, open The Ps4 browser and type the address mentioned to launch the exploit. Follow the onscreen instructions.

The power off button visible in the page is useless in my case, since the Board is always on for other stuff.


Hi. I tried to make a build for for an orange pi zero but each time I get error messages. I'm new to git and I don't know what's wrong.
Could someone post a link to an image build as there is no release on github.
I can't be the only one struggling with this.

:fire: Latest Help Topics