All currently known Wii U exploits can, unlike e.g. the Nintendo Switch RCM exploit, be patched by a system update. Although the Wii U is no longer officially supported, Nintendo may still release updates for it. Namely, the updates 5.5.3, 5.5.4 and 5.5.5 were all released after the Wii U was discontinued, so blocking updates is still a recommended action.
Currently, three ways exist to block updates on the Wii U system:
?> When autobooting into the the PayloadLoader, updates are automatically blocked. To enable autobooting into the PayloadLoader follow this.
?> This method of update blocking is a bit more advanced than DNS Blocking and uses a homebrew app to modify system files. However, it has the advantage that the eShop's functionality will not be restricted.
- Plug your SD Card into your Computer.
- Download and extract UFDiine to the root of your SD Card.
- Plug the SD Card into your Wii U console and power it on.
- Enter the Homebrew Launcher.
- Navigate the Homebrew Launcher and run the UFDiine app.
- Press the A button to delete the update folder.
- Confirm that it says
Update folder is deleted
. You are now blocking updates.
?> This method is the easier method and is recommended to less advanced users. It does, however, prevent the eShop from working. This can be worked around by running NNUPatcher before starting the eShop.
- Plug your SD Card into your Computer.
- Copy the contents of the
nnupatcher.zip
file to the root of your SD Card. If asked, overwrite any duplicate files. - Plug the SD Card into your Wii U console and power it on.
- Enter the Wii U's system settings and navigate to
Internet > Connect to the Internet > Connection List >
Your WiFi connection > Change Settings > DNS
and set the option toDo not auto-obtain
. - You will be asked to input a primary and secondary DNS. Enter the following IP addresses:
- Primary DNS: 168.235.092.108
- Secondary DNS: 081.004.127.020