A simple customization toolbox that utilizes CVE-2025-24203.
All file modifications are done in memory. If something goes wrong or you want to revert the tweaks, just force reboot your phone. Note that this toolbox, or any subsequent toolbox that uses this exploit, cannot write to files. It can only temporaily disable them.
| iOS Version | Support Status |
|---|---|
| iOS 16.0 - iOS 16.7.12 | Supported |
| iOS 17.0 - iOS 17.7.5 | Supported |
| iOS 17.7.6+ | Not Supported |
| iOS 18.0 - iOS 18.3.2 | Supported |
| iOS 18.4+ | Not Supported |
- respring loop your device
- induce a kernel panic
- screw with the passcode screen
- disable internet
- remove all ringtones
- disable home bar
- helvetica font on ios 16
- remove emojis
- disable fonts
- disable ability to unlock your phone
- remove all app signatures
- bootloop device
- "screentime disabler"
- porn enabler
- keyboard disabler
- Install RespringApp using your preferred method of sideloading. Make sure the bundle ID is exactly
com.respring.app. - In dirtyZero, click the orange "Respring" button.
- Profit 🔥
This method brought to you by @nyaathea. Due to the nature of the method, it is not possible to integrate this directly into the dirtyZero app, hence the seperate IPA. Note that you can also simply click the RespringApp application itself to respring.
Option 2: Display & Text Size
- Before applying the tweaks, go into Settings > Display & Brightness > Display Zoom
- Pick the option that's opposite of the one you're currently using.
- After, apply the tweaks.
- Go back into Settings > Display & Brightness > Display Zoom
- Pick the option that's opposite of the one you're currently using.
- Skadz for making the original dirtyZero app.
- lunginspector for making the dirtyZero UI.
- Ian Beer of Google Project Zero for discovering and publishing the exploit.