CoD4x_Server
CoD4x_Server copied to clipboard
Devmap exploit
https://cod4x.me/index.php?/forums/topic/2676-please-patch-devmap-uav-hack-exploit/&tab=comments#comment-12766
I can only suggest to replace all references to dvar by its name "sv_cheats" and use only sv_cheats
and not dvar_cheats
(according to name in macOS binary). So changing name will not affect dvar pointer. Also, reading server value (in connect packet?) and then changing value by pointer - will do the way it suppose to work.
(+ reset cheat-protected dvars to theirs default values ^^ )
Its worth pointing out that the devmap part from my testing is completely irrelevant to the exploit. You just have to change the dvar names in a hex editor and then apply them in game. g_compassShowEnemieg 1 for example.
Changing name of a variable used to prevent it from being changed by server. Its flags stays the same (cheat-protected). Devmap allows you to change any cheat-protected dvar.
Hmm interesting, it always seemed to work the way I Was suggesting (then again the last I tested it was a good year and a half ago so perhaps I am mistaken). Would be nice to patch this I guess.