Platform: Nintendo 3DS
Dr. Robotnik's Mean Bean Machine
Super C
Adventure Time: Hey Ice King! Why'd You Steal Our Garbage?!
Super Mario Land 2: 6 Golden Coins
Pokémon Gold Version
Mega Man 5
Rayman 3D
The Legend of Zelda: A Link Between Worlds
Mario & Sonic at the Rio 2016 Olympic Games
The Legend of Zelda: Ocarina of Time 3D
Mega Man
Retro City Rampage
Pokémon Green Version
Mario & Luigi: Paper Jam
Balloon Kid
American Mensa Academy
Castlevania
Mario & Luigi: Dream Team
Chibi-Robo! Zip Lash
Rayman Origins
Fire Emblem: Shadow Dragon and the Blade of Light
Mario Party: The Top 100
Skylanders: Giants
Mini Mario & Friends: Amiibo Challenge
Donkey Kong Land III
Wario Land 4
Donkey Kong 3
Super Mario 3D Land
Sonic the Hedgehog 2
Wario Land 3
Pokémon X
Theatrhythm Final Fantasy
Yo-kai Watch 3
Ninja Gaiden III: The Ancient Ship of Doom
Kirby's Dream Land
Sakura Samurai: Art of the Sword
Hotel Transylvania
Shantae
Bravely Default: Flying Fairy
The Legend of Zelda: Oracle of Ages
Ghosts 'n Goblins
WarioWare Gold
Project X Zone
Adventures of Lolo
Mole Mania
Super Mario Maker for Nintendo 3DS
Joy Mech Fight
Tetris
The Great Ace Attorney 2: Resolve
Persona Q: Shadow of the Labyrinth
▲
4
▼
In 2021, dataminers discovered a consistent security vulnerability, later termed "ENLBufferPwn", in multiple Nintendo 3DS, Wii U, and Nintendo Switch games. ENLBufferPwn made it possible to inject code into another player's system during online multiplayer by deliberately triggering a buffer overflow in a game's "ENL" network library. The glitch was known to be possible in Animal Crossing: New Horizons, Arms, Mario Kart 7 (where the glitch instead targets the "Net" library), Mario Kart 8, Mario Kart 8 Deluxe, Nintendo Switch Sports, Splatoon, Splatoon 2, Splatoon 3, and Super Mario Maker 2, with other games potentially being affected.
ENLBufferPwn generated significant cybersecurity concerns due to its ease of execution, the fact that it could be pulled off without the target player's notice, and the wide range of actions that could occur through it, up to and including identity theft and espionage. Reflecting this, the United States federal government's National Vulnerability Database gave the glitch a 9.8 rating, reflecting critical threats to public safety. Following multiple reports issued by white hat hackers between 2021 and 2022, Nintendo patched all known affected games to remove the vulnerabilities that made ENLBufferPwn possible.
ENLBufferPwn generated significant cybersecurity concerns due to its ease of execution, the fact that it could be pulled off without the target player's notice, and the wide range of actions that could occur through it, up to and including identity theft and espionage. Reflecting this, the United States federal government's National Vulnerability Database gave the glitch a 9.8 rating, reflecting critical threats to public safety. Following multiple reports issued by white hat hackers between 2021 and 2022, Nintendo patched all known affected games to remove the vulnerabilities that made ENLBufferPwn possible.
GitHub page explaining ENLBufferPwn:
https://github.com/PabloMK7/ENLBufferPwn
National Vulnerability Database page on ENLBufferPwn:
https://nvd.nist.gov/vuln/detail/cve-2022-47949
Nintendo World Report article about the anti-ENLBufferPwn updates:
https://www.nintendoworldreport.com/news/62471/major-security-vulnerability-disclosed-in-multiple-nintendo-games
Bitdefender article about the anti-ENLBufferPwn updates:
https://www.bitdefender.com/en-us/blog/hotforsecurity/nintendo-patches-enlbufferpwn-vulnerability-that-could-lead-to-complete-console-takeover
https://github.com/PabloMK7/ENLBufferPwn
National Vulnerability Database page on ENLBufferPwn:
https://nvd.nist.gov/vuln/detail/cve-2022-47949
Nintendo World Report article about the anti-ENLBufferPwn updates:
https://www.nintendoworldreport.com/news/62471/major-security-vulnerability-disclosed-in-multiple-nintendo-games
Bitdefender article about the anti-ENLBufferPwn updates:
https://www.bitdefender.com/en-us/blog/hotforsecurity/nintendo-patches-enlbufferpwn-vulnerability-that-could-lead-to-complete-console-takeover
▲
1
▼
When run on a Nintendo DSi or Nintendo 3DS, Action Replay DSi's icon and title will be listed as Game & Watch Collection. This is a way of working around the DSi's bootleg game protection, which is done by having a built-in whitelist of every official DS game, which Action Replay circumvents by tricking the device into thinking Game & Watch Collection is being played. Action Replay DSi contains almost every byte of data from Game & Watch Collection, but jumbled into an unplayable format.
▲
1
▼
According to video Game developer Yukio Futatsugi, his tabletop board game Machi Koro was originally going to be a digital board game available on the 3DS, but Nintendo encouraged Futatsugi and his company Grounding to go physical with it instead.
"My company has made a lot of board games, and Nintendo has told me that our games are interesting. Machikoro was supposed to be on 3DS, but the idea didn’t become a reality because it wouldn’t sell on 3DS, and so Nintendo suggested, 'Hey, Grounding, why don’t you manufacture this as a physical board game, I’m sure it will sell really well!' and that’s how Grounding came to become a board game creator."
"My company has made a lot of board games, and Nintendo has told me that our games are interesting. Machikoro was supposed to be on 3DS, but the idea didn’t become a reality because it wouldn’t sell on 3DS, and so Nintendo suggested, 'Hey, Grounding, why don’t you manufacture this as a physical board game, I’m sure it will sell really well!' and that’s how Grounding came to become a board game creator."
▲
1
▼

This was done to bring it in line with European laws put in place to prevent manipulating children into purchases; "Games should not include practices that are aggressive, or which otherwise have the potential to exploit a child's inherent inexperience, vulnerability or credulity or to place undue influence or pressure on a child to make a purchase."
▲
1
▼
Holding the start + select buttons while booting an original Nintendo DS cartridge will load the game in its native resolution, rather than stretching it.
▲
1
▼
In 2012 the Louvre museum in Paris, France, started offering 3DS museum guides. The purchase of the hardware was sponsored by Korean Air, and all the museum guides are branded with the airline's logo.
▲
1
▼

▲
1
▼
Making noise into the microphone while on the system settings screen will cause the icons to spin around the wrench. While doing this, the wifi helper icon can be seen on the back of the internet icon.
▲
1
▼
If you blow into the mic while highlighting a 3DS application, the icon will spin around faster.