Back to home
Technology

GameStop patches 'infinite money glitch' for Nintendo Switch 2 trade-in — crafty YouTuber trades $415 console in for $472 with purchase of pre-owned game multiple times

Source

Tom's Hardware

Published

TL;DR

AI Generated

GameStop has patched an "infinite money glitch" for the Nintendo Switch 2 trade-in after a YouTuber exploited the loophole to trade in a $415 console for $472 by purchasing a pre-owned game multiple times. The glitch involved taking advantage of a 25% bonus on pre-owned items, allowing the YouTuber to accumulate $150 in store credit over two days. GameStop acknowledged the exploit, fixed the loophole, and commended the YouTuber for their ingenuity while clarifying that their stores are not meant to be "infinite money printers." The YouTuber's experience highlighted a flaw in GameStop's system that briefly valued pre-owned trades more than the new retail cost of the console, enabling customers to repeat the transaction to amass store credit exponentially.

Read Full Article

Similar Articles

Microsoft’s ‘unhackable’ Xbox One has been hacked by 'Bliss' — the 2013 console finally fell to voltage glitching, allowing the loading of unsigned code at every level

Microsoft’s ‘unhackable’ Xbox One has been hacked by 'Bliss' — the 2013 console finally fell to voltage glitching, allowing the loading of unsigned code at every level

At the recent RE//verse 2026 conference, a groundbreaking hack named 'Bliss' was revealed, successfully breaching Microsoft's supposedly 'unhackable' Xbox One console. Markus ‘Doom’ Gaasedelen demonstrated the exploit, utilizing Voltage Glitch Hacking to load unsigned code at various system levels. This hack marks a significant breakthrough after years of the Xbox One being considered highly secure. The exploit involves precise voltage glitches to bypass security measures, providing access to the console's security processor and potentially leading to new emulation possibilities.

Tom's Hardware
Feds take notice of iOS vulnerabilities exploited under mysterious circumstances

Feds take notice of iOS vulnerabilities exploited under mysterious circumstances

The Cybersecurity and Infrastructure Security Agency has directed federal agencies to address three critical iOS vulnerabilities that were exploited by three distinct hacking groups over a 10-month period. Google's report revealed the use of an advanced hacking kit called Coruna, which contained 23 iOS exploits in five potent chains. While the vulnerabilities had been patched by Apple, the exploits were still effective against older iOS versions, posing a significant threat due to their high-quality code and capabilities. CISA has included these vulnerabilities in its list of known exploited vulnerabilities, urging all organizations to patch them, as they affect iOS versions 13 to 17.2.1 and have advanced features like a unique JavaScript framework for device fingerprinting.

Ars Technica
WinRAR exploit reportedly remains widely-used by China and Russia state actors despite patch — vulnerability allows malicious archives to deliver a hidden payload to Windows Startup folder

WinRAR exploit reportedly remains widely-used by China and Russia state actors despite patch — vulnerability allows malicious archives to deliver a hidden payload to Windows Startup folder

Despite a patch released in July 2025, a WinRAR exploit (CVE-2025-8088) continues to be utilized by state actors from China and Russia, allowing them to deliver hidden payloads to critical directories like the Windows Startup folder. The exploit takes advantage of a path traversal vulnerability in earlier WinRAR versions, enabling attackers to surreptitiously deliver malware when victims open malicious archives. Despite the availability of fast internet and cloud storage, archiving apps like WinRAR remain popular due to their ability to package files, encrypt data, and reduce file sizes. Users are advised to update WinRAR to the latest version (7.13) to mitigate the risk of falling victim to this exploit, which has targeted Ukrainian military units, government entities, and commercial organizations in various regions.

Tom's Hardware
Forgotten Star Wars Racer Revenge game is key to jailbreaking PlayStation 5, price soars 1,900% overnight amid leaked ROM keys exploit — Physical copies of the PS4 game go from $20 to $400 on eBay

Forgotten Star Wars Racer Revenge game is key to jailbreaking PlayStation 5, price soars 1,900% overnight amid leaked ROM keys exploit — Physical copies of the PS4 game go from $20 to $400 on eBay

The PlayStation 5 jailbreak is on the horizon due to leaked ROM keys, with Star Wars Racer Revenge being a crucial component for the exploit. The game, specifically the PlayStation 4 physical edition, contains a rare vulnerability essential for injecting code into the system. Prices for the game have skyrocketed from $20 to $400 on eBay as jailbreakers and collectors scramble to secure copies. While the jailbreak is not yet available to the public, early adopters may resell their copies after use, potentially lowering prices. Aspiring jailbreakers are advised to search local stores or online platforms for the elusive game.

Tom's Hardware

We use cookies

We use cookies to ensure you get the best experience on our website. For more information on how we use cookies, please see our cookie policy.