I decided to start playing around with the ROP library.. I noticed at the end of execution we restore the stack pointer to it's original position.. So I decided to jump to a completely different position. I am working through and have managed to get the PS4 to not respond to the D-Pad on successful exploits when setting the pointer to before we changed it. I figure there must be a point in the stack in which some form of call is made to a system routine; so if I find it I will keep you guys updated. In the mean time I may focus some effort on stabilising the exploit as it is very hit-and-miss as to when the exploit is successful.
inb4 who are you: Guess you will just have to wait and see. I haven't been on any scene in around 6 years, it's been a while.