Security guru Geohot has released a root exploit which is said to work on any Android device with a kernel build date prior to June 3, 2014. You read that right, any Android device, including those running 4.4.2 (even one or two that are running 4.4.3). So far it's confirmed to be working on multiple carrier variants of the S4 and S5, as well as the Note 3, and the Razr HD and M. And as a special added bonus for Razr HD/M users, this root exploit will open the door to being able to unlock your devices' bootloaders with djrbliss' previously released tool. Both exploits are accomplished by installing a specific apk file, so no computer needed. Oh, and if you want to take advantage of this, you may want to get on it, as this exploit will definitely be patched in the next set of updates. Info for the root exploit is
, info for the HD/M unlock can be found right . Standard caveats apply.New Multi-Device Root Method with Bonus Bootloader Unlock for Razr HD/M!
#2
Posted 16 June 2014 - 06:35 AM
Just a note as I've been following Geohot's thread on XDA for the last 21 or so hours, it does not work on all devices. Exynos processor devices currently need not apply. 2013 Moto and most HTC devices are also not included. That being said, this is huge news. Especially for the 2012 HD/M users. I implore you to unlock IMMEDIATELY. I'm more than willing to help out anyone's who's having trouble. Just visit my thread and we'll get you sorted out.
- cmorty72, TwoBuells, rickw and 2 others like this
Non potest esse nisi unus
#3
Posted 16 June 2014 - 07:02 AM
#4
Posted 16 June 2014 - 07:10 AM
Given that it's working on older Moto, most LG, a bunch of Sony, and a frack ton of Sammy devices, yes, this was huge. From what I understand that's a difficult to exploit security hole, and to get it across so many devices is damn amazing. Plus to put it in a freaking APK that you literally install and press the "duhhhhhh, root?" button...just sick. As I mentioned on xda, root IS getting more difficult, but, it's good to see collaboration taking place. Pinkie Pie found the exploit. JCase implemented it for tethered root on the 2013 Moto devices. Geohot kicks the snot out of it and makes a one click for half the devices out there. LOL! My S4 GPE works with it, too....on 4.4.3. LMAO!
Non potest esse nisi unus
#5
Posted 16 June 2014 - 07:12 AM
I'm gonna try it on the BIONIC For S&G.
- Thach, mjs27541 and transmissiontech like this
#6
Posted 16 June 2014 - 07:13 AM
- cmh714 likes this
#7
Posted 16 June 2014 - 07:14 AM
Which brings me to a point I neglected to bring up on the OP. Everyone who takes advantage of the work these guys put out for OUR benefit needs to pay up. The amount of time and effort that goes into finding and implementing these exploits is mind boggling.
Yes, THIS. They deserve a few quid if you're using this on a device that needs it.
Non potest esse nisi unus
#8
Posted 16 June 2014 - 07:14 AM
I was thinking about doing the same.I'm gonna try it on the BIONIC For S&G.
#10
Posted 16 June 2014 - 07:48 AM
Interested in out come as well as I'm still on bionic.I'm gonna try it on the BIONIC For S&G.
Sent from my DROID BIONIC using Tapatalk 2
Thanks Droidrzr for the continued support of my family and a special thank you to Kaos and Kelly....
Google pixel 32 gig....
#12
Posted 16 June 2014 - 08:21 AM
After a failed RSD session b/c I'm an idiot, and then continuous failures using the correct FXZ, followed by failures after downgrading RSD Lite to 5.7, I used Sam's FXZ Installer jar and it's now booting. As soon as I am in I'm pushing the tr.apk to the phone and running it and seeing what happens.
I'm then pushing Koush's Superuser to the phone instead of iether SuperSU or the original superuser b/c I like it a lot better (assuming, of course, that tr actually works).
*fingers crossed*
#13
Posted 16 June 2014 - 08:23 AM
That won't work. Superuser won't be able to update the binary. SuperSU 1.99r4 is the only thing that can. So to augment your method, install Superuser.apk from the supersu 1.99r4 zip file (common/Superuser.apk), allow it to update the binary after you root, and then Superuser should be able to update the binary and take over. Uninstall supersu at that point.
Non potest esse nisi unus
#14
Posted 16 June 2014 - 08:25 AM
Back to pure stock no info. Time to see if this really works....
#15
Posted 16 June 2014 - 08:26 AM
That won't work. Superuser won't be able to update the binary. SuperSU 1.99r4 is the only thing that can. So to augment your method, install Superuser.apk from the supersu 1.99r4 zip file (common/Superuser.apk), allow it to update the binary after you root, and then Superuser should be able to update the binary and take over. Uninstall supersu at that point.
So, the Koush superuser has already been tried?
Bummer.
#16
Posted 16 June 2014 - 08:27 AM
So, the Koush superuser has already been tried?
Bummer.
Yes, it won't update the su binary that the towel root exploit uses. Only supersu 1.99r4 can touch it. But like I said, once you let supersu update it, you can then let superuser take over and uninstall supersu no problem.
Non potest esse nisi unus
#18
Posted 16 June 2014 - 08:51 AM
How'd that go?
Non potest esse nisi unus
#19
Posted 16 June 2014 - 08:52 AM
Sent by a Motorola Fanboy
#20
Posted 16 June 2014 - 08:57 AM
And... TiBu says no root. Gonna try to see if the supersu can see and update it or not.
1 user(s) are reading this topic
0 members, 1 guests, 0 anonymous users