giefroot
A tool to root your device using CVE-2014-7911 (by Keen Team) and CVE-2014-4322 (by zxz0O0).
System rw access & SuperSU installation.
A tool to root your device using CVE-2014-7911 (by Keen Team) and CVE-2014-4322 (by zxz0O0).
System rw access & SuperSU installation.
Requirements
- USB debugging enabled
Settings => About phone => Click 7 times on Android Build to unlock developer options - Allow mock locations
Settings => Developer Settings - adb drivers installed
- Firmware < October 2014 (kernel and system)
How to use
- Download the tool (latest version) and extract it
- Start your device and plug it to your computer
- Put your device in air plane mode
- Run install.bat and follow the instructions on screen
- Congratulations! You should now be rooted. If you get an error "Device not rooted", try running the tool a second time.
Don't forget to make a donation
If you are not rooted, see post #3 for possible solutions!
What can you do next
- Make a donation to the people involved
- Backup TA partition / DRM keys
http://xdaforums.com/showthread.php?t=2292598 - Install dualrecovery by [NUT]
Download Z??-lockeddualrecovery2.X.XXX-BETA.installer.zip from http://nut.xperia-files.com/, run install.bat and select Option #1
Note if you have problems after installing recovery, this thread is not the place to ask for help!
Download v3.1
Thanks to
Big thanks to Keen Team for developing the CVE-2014-7911 exploit.
Original thread: http://xdaforums.com/mate-7/general/wip-mate-7-root-bl-unlock-t2995086/post57991147
Code:
88 a8P 88888888888 88888888888 888b 88
88 ,88' 88 88 8888b 88
88 ,88" 88 88 88 `8b 88
88,d88' 88aaaaa 88aaaaa 88 `8b 88
8888"88, 88""""" 88""""" 88 `8b 88
88P Y8b 88 88 88 `8b 88
88 "88, 88 88 88 `8888
88 Y8b 88888888888 88888888888 88 `888
Huawei Ascend Mate 7 root utility
Present by Keen Team:
Liang Chen, flanker017 - CVE-2014-7911 exploit
idl3r - Kernel vulnerability and exploit
Special thanks to:
Yaron Lavi and Nadav Markus from Palo Alto Networks for "Mock Location" trick
Chainfire for SuperSU
KingRoot (www.kingroot.net) for testing devices
Tested on MT7-TL10 and MT7-CL00 China Domestic edition with B122 SP06 (2014/12/30)
May or may not work on international editions
Additionally, thanks to:
- Chainfire: SuperSU developer
- MohammadAG: Disable RIC kernel module (Link)
- idler1984: Trick for stopping system_server
- RHBH, squabbi, minijaws, Desperanto86: Testing & debugging
Changelog
- v3.1
- Add new device D6643 and D6616 (see here)
- Small fixes
- v3
- Fixed a few bugs allocating memory
- Add some new devices / firmwares for compatibility
- v2
- Fix phone rebooting before exploit completed (thanks idler1984!)
- Fix error allocating memory for exploit code
- v1
- Initial release
XDA:DevDB Information
giefroot - rooting tool, Tool/Utility for the OEM Cross Device Development
Contributors
zxz0O0
Version Information
Status: Beta
Created 2015-01-24
Last Updated 2015-05-03
Last edited: