>>22935104DO NOT UPDATE EVER!
From Reddit:
I'm the person who developed PKHeX, and worked extensively with SciresM to get injection rolling over a month ago. If anyone is able to decisively say "nope, don't expect a workaround", it'd be me.
The web browser had a Webkit vulnerability which allowed for ARM11 code execution; for example, RAM reading/writing. Patching this vulnerability removes any chance for ARM11 kernel control, so no more Web Injection.
Any sort of workaround would require a zero day exploit. Good luck with that; the spider exploit was dropped by Gateway, a flashcart manufacturer who made loads of money selling a flashcart to play pirated games.
Source: Kaphotics
http://www.reddit.com/r/PokemonQRCodes/comments/2xqimq/psa_patch_prevents_injecting_do_not_update/cp2isv8