[H420F] [QUESTION] Bootloader Unlocked Testers - LG Spirit Questions & Answers

Hello everyone .. I apologize in advance if someone feels offended by what I'm going to upload ... And for my English.
The idea was to unlock the bootloader natively on an uboot of the H420F since what is uploaded to the network is for the H422.
I modified the uboot of the H420F that comes in the operator Tigo rom "I think of the country El Salvador" by identifying the pattern with which the H422 was patched (I compared an MD5 between the uboot of the patched H422 with the one I modified from an original h422 and he gave me the same MD5); that's what I mean, the job is really someone else's and I apologize for that.
I have seen harmony between the uboot of H420 and H422 and the binary is almost the same at the beginning of the uboot (remember that the H422 is dual sim and the H420 is not), therefore I have high hopes that it will work (the values ​​that I modified were the same as those with H422) ..
I could not test it since the phone I have is an H440AR.
If someone is sure of being able to recover his cell phone on his own in case of failure, I invite him to test if it works and comment in the comments ...
In case you do not know what you are doing please do not download it or flash it, very likely to hardbrick.
I did this because there was nothing available natively for the H420F.
my.pcloud.com/publink/show?code=XZKL687ZTLJoHlPGBG4OaQP91CIB8YlVOfMX
Thank you very much.

Related

Which TWRP for TF300TL?

Hi!
I would like to apologize, if I was unable to find a matching thread for my problem. I am rather new to Android and have great respect for unlocking and modding my device, but would like to do so. I own a TF300TL and are stopped at the very beginning. I am unable to find the matching TWRP for the device and would like to know, which would be the correct file, as I am afraid, that I could easily brick my device. Perhaps someone has done this with a TF300TL. At the moment, I have not yet unlocked the bootloader.
I have installed the latest stock rom on the device.
Do I have to flash the TG version of TWRP? And I am unsure, if I need -JB, -4.2? It is very difficult to understand.
Regards,
Matthias
xcommy said:
Hi!
I would like to apologize, if I was unable to find a matching thread for my problem. I am rather new to Android and have great respect for unlocking and modding my device, but would like to do so. I own a TF300TL and are stopped at the very beginning. I am unable to find the matching TWRP for the device and would like to know, which would be the correct file, as I am afraid, that I could easily brick my device. Perhaps someone has done this with a TF300TL. At the moment, I have not yet unlocked the bootloader.
I have installed the latest stock rom on the device.
Do I have to flash the TG version of TWRP? And I am unsure, if I need -JB, -4.2? It is very difficult to understand.
Regards,
Matthias
Click to expand...
Click to collapse
Try going to the TWRP website then search by your device. The differences are clearly explained there. I have the 300 and I have the late July OTA, I beeline it's 10.1.6.25.1 ire something close to that. In any event I had to use the 4.2 version. Be sure to use the blob file and not the IMG file.
Sent from the Awesome Lone Star State where the law abiding carry guns and the criminals think twice.

Risk of unlocking bootloader and flashing twrp.

Hello
I am aware that there isn't any warranty at all here that anything you do won't have negative effects on your phone. I've flashed quite a few roms on phones like the oneplus one, sony xperia sp, samsung galaxy core plus, nexus 5x, lg cookie, moto defy plus,... I've had tens of soft bricks, but never anything I couldn't recover from.
Anyways, I'm sick and tired of the laggy MiFavor UI on this phone, and would like to install CM13. I've an A2016G. I've seen some EU folk have issues with Tenfar's unlocking method, having hard bricked them since they can't get into a certain (EDL?) mode.
My question is this: if I read every thread and follow every step very carefully, is there a major risk my axon 2016G turns into a 450 euro paperweight? Is there perhaps another unlock method that's 99% secure?
Thank you
Jan
Hate to be that guy, but is there no-one with some knowledge around this?
Thanks.
Controllerboy said:
Hate to be that guy, but is there no-one with some knowledge around this?
Thanks.
Click to expand...
Click to collapse
Let me be the second guy, I'm amazed no one replied...
I'm in the same predicament; do I stay stock and use a great piece of hardware with crap software, or do I dare take the plunch and be able to make the phone as it ought to be at the risk of ending up with a very expensive paperweight...
What the hell did ZTE think when developing the A2017G model. And why is there after all these month no clear answer/procedure for this model. Is it that rarely used? How come there is no solution even though the firehose files are out there?
Hope someone finds a fullproof solutions soon....
Cheerz,
/Cacti
Verstuurd vanaf mijn ZTE A2017G met Tapatalk
I have the US model and I won't use tenfar's method on the phone for which it's intended. It's a questionable method
Unlocking your bootloader and Flashing CM13 is pretty easy and I don't really think there is much risk of permanently bricking your phone. However as of right now it really isn't worth the effort. I flashed CM 13 yesterday and it ran well, but the camera wasn't working so I decided to go back to the stock software. So unless you don't need the camera I'd skip flashing for now.
lag?
Controllerboy said:
Hello
I am aware that there isn't any warranty at all here that anything you do won't have negative effects on your phone. I've flashed quite a few roms on phones like the oneplus one, sony xperia sp, samsung galaxy core plus, nexus 5x, lg cookie, moto defy plus,... I've had tens of soft bricks, but never anything I couldn't recover from.
Anyways, I'm sick and tired of the laggy MiFavor UI on this phone, and would like to install CM13. I've an A2016G. I've seen some EU folk have issues with Tenfar's unlocking method, having hard bricked them since they can't get into a certain (EDL?) mode.
My question is this: if I read every thread and follow every step very carefully, is there a major risk my axon 2016G turns into a 450 euro paperweight? Is there perhaps another unlock method that's 99% secure?
Thank you
Jan
Click to expand...
Click to collapse
ok, where is this lag? I've been using it stock since I got it after the Note 7, which was very laggy, and have failed to notice any lag.
Zero lag here as well, buttery smooth at all times. Heads and shoulders above the Note 7 that I came from in terms of responsiveness and general performance.
Sent from my ZTE A2017 using Tapatalk
jawz101 said:
I have the US model and I won't use tenfar's method on the phone for which it's intended. It's a questionable method
Click to expand...
Click to collapse
On the US model, you can get an unlocked bootloader & all the trimmings without using tenfar's tool at all, although it's a bit more of a roundabout method.
Just unlocked mine working great.
Hi,
Just thought I'd add as I'm one of those who did end up in DFU mode permanently. I have a reasonable understanding of the issue at hand and I've been one of the few who have been vocal about not calling the current method safe of us.
My suggestion if you have a A2017G is not to bother using tenfar's tool unless you're willing to RMA or make use of your warranty. I'm not in a position where I can do that, but since most are there hasn't been much interest in a solution.
I don't have the firehose itself to begin working on fixing the issue, though I do have a rough idea of how do so using the partition table for TWRP but I don't think I have the time to learn how to put it all together myself. Particularly when I'm replacing my Axon 7 with a Mi Note 2.
What is needed is an unbrick tool, ZTE have made and released them for their own devices before, why they don't do that with Axon 7 is beyond me.
rendler said:
Zero lag here as well, buttery smooth at all times. Heads and shoulders above the Note 7 that I came from in terms of responsiveness and general performance.
Sent from my ZTE A2017 using Tapatalk
Click to expand...
Click to collapse
You must be using the US or CN model, because the EU model is laggy as hell. It's by far the laggiest ROM I used on a phone with high-end specs..
keessonnema said:
You must be using the US or CN model, because the EU model is laggy as hell. It's by far the laggiest ROM I used on a phone with high-end specs..
Click to expand...
Click to collapse
Yup, using Chinese model with 128GB of storage.
Sent from my ZTE A2017 using Tapatalk
Just my 2 cents having unlocked the bootloader on my A2017G. I used tenfar's tool to backup the boot and stock recovery images and flashed the TWRP recovery and didn't run into problems fortunately. I wouldn't recommend to flash the rooted boot.img by tenfar until (hopefully) we'll have a unbrick tool for the G version.
My recommendation ----- On the G version don't mess around with the bootloader! ----- My recommendation
I've been able to unlock the bootloader on B03, reflashed stock recovery with tenfar's tool and successfully updated to B05 from the SD card.
If you want root I recommend to go the unlock bootloader - flash SuperSU 3.65 route instead of flashing the pre-rooted boot.img from tenfar with a locked bootloader as chances of things going haywire seem to be greater with the second method on the G version.
In case you have any reservations I definitely recommend to wait for a unbrick method of the G version before you try any of this. If and when such a method will come is undetermined at this point in time.
@lag of G version: Can't confirm that on B05, everything running smooth so far. There are a few graphical glitches though (stock browser displaying left side first und has sometimes trouble to show the content fullscreen.
Pull down notification bar has double lined icon text slightly cut off on the bottom once you switch to landscape mode and pull down the notification bar.
jawz101 said:
I have the US model and I won't use tenfar's method on the phone for which it's intended. It's a questionable method
Click to expand...
Click to collapse
I've seen this said a couple of times (or maybe it's just you in different threads, I don't know), but I don't understand it. By its very nature, rooting your phone is "questionable". Why is tenfar's method/tool any worse than any other method or tool? Do you have some technical insight to provide (and if so, please do so) or is it just an opinion based on nothing? I certainly don't have any issue with the latter, but I find it odd that people without any technical expertise speak as if they're an authority of some kind.
rczrider said:
I've seen this said a couple of times (or maybe it's just you in different threads, I don't know), but I don't understand it. By its very nature, rooting your phone is "questionable". Why is tenfar's method/tool any worse than any other method or tool? Do you have some technical insight to provide (and if so, please do so) or is it just an opinion based on nothing? I certainly don't have any issue with the latter, but I find it odd that people without any technical expertise speak as if they're an authority of some kind.
Click to expand...
Click to collapse
It's probably me and a few others. Ok, answer me these questions:
What does the tool specifically modify on the phone?
What is a "firehose mbn" anyway? Tenfar mentioned it is how it gains access to the phone. I don't know if that is a tool to do so or if it's a file that gets put on the phone in a more permanent chipset-level storage only meant to be altered by Qualcomm or phone manufacturers. I'm find with replacing a recovery, kernel, ROM- the boot.img or anything lower than that is closed source for a reason. Probably because it's talking directly to the hardware and code at that lower level can circumvent anything in a kernel, recovery or ROM.
Would it affect Snapdragon SmartProtect?
https://www.qualcomm.com/products/snapdragon/security/smart-protect
Why do virus scanners call it a Windows trojan if it's an Android hack?
Yes, I call it questionable because I have questions. Since the file is encrypted you can't answer those questions for me. All I can gather is everyone who has used it has basically said "I used it and it did what I wanted it to do so it must be safe."
---------- Post added at 10:20 AM ---------- Previous post was at 09:46 AM ----------
@rczrider
Here are the posts in the thread by a security expert asking questions about the method.
http://forum.xda-developers.com/search.php?searchid=430010789
Here is tenfar's response to him
http://forum.xda-developers.com/axo...r-unlokced-t3441204/post68301899#post68301899
Here's a post from him on ZTEUSA
https://community.zteusa.com/message/50425
Here's a blog post he made about it
https://blog.onedefence.com/signed-firehose-images-and-why-theyre-dangerous/?pk_campaign=zte-forums
jawz101 said:
It's probably me and a few others. Ok, answer me these questions:
What does the tool specifically modify on the phone?
What is a "firehose mbn" anyway? Tenfar mentioned it is how it gains access to the phone. I don't know if that is a tool to do so or if it's a file that gets put on the phone in a more permanent chipset-level storage only meant to be altered by Qualcomm or phone manufacturers. I'm find with replacing a recovery, kernel, ROM- the boot.img or anything lower than that is closed source for a reason. Probably because it's talking directly to the hardware and code at that lower level can circumvent anything in a kernel, recovery or ROM.
Would it affect Snapdragon SmartProtect?
https://www.qualcomm.com/products/snapdragon/security/smart-protect
Why do virus scanners call it a Windows trojan if it's an Android hack?
Yes, I call it questionable because I have questions. Since the file is encrypted you can't answer those questions for me. All I can gather is everyone who has used it has basically said "I used it and it did what I wanted it to do so it must be safe."
---------- Post added at 10:20 AM ---------- Previous post was at 09:46 AM ----------
@rczrider
Here are the posts in the thread by a security expert asking questions about the method.
http://forum.xda-developers.com/search.php?searchid=430010789
Here is tenfar's response to him
http://forum.xda-developers.com/axo...r-unlokced-t3441204/post68301899#post68301899
Here's a post from him on ZTEUSA
https://community.zteusa.com/message/50425
Here's a blog post he made about it
https://blog.onedefence.com/signed-firehose-images-and-why-theyre-dangerous/?pk_campaign=zte-forums
Click to expand...
Click to collapse
OK, It would be nice if people would inform themselves about this but unfortunately this is the state of XDA now... so here we go
- Firehose is a protocol used to communicate to the qcom chipset directly at a level lower than OS. Since there are security measures in place, in order to talk to it you need a signed firehose withe a coresponding certificate that is burned into the SBL. This is what ZTE uses to directly flash the units at factory and can also be used at repair centers. Tenfar is in possession of such a file and his flasher utilizes it to write modified boot and recovery that would otherwise be discarded by SoC's security protocols. Since it's obfuscated code to hide the firehose plus in addition uses comm libs and code that probably reads and writes other files, it is no wonder it gets flagged by AV software. I had ODIN flagged by Avast once.
- The boot.img is not closed-source, it is actually kernel and ramdisk and can be unpacked so you can see what's inside. It can be compared to stock as well and in fact that is exactly what his are, patched stock boot images. The boot image has been patched in order to allow the modified boot img with root to boot since SecureBoot is still in place due to locked bootloader. In addition is modifies SE Linux to allow root to run. And that brings us to why this tool exists in the first place. It is to allow you to bypass SecureBoot and have root and was created in the period before unlock method was provided by ZTE. It is still the only method to use on non-US model. It is a hack tool by definition and has made development on this phone move ahead way further then it would.
- The security concerns raised were more along the line of how bad it is that the signed firehose is in the wild, not so much to what tenfars tool does or how it does it. The expert even wanted the firehose to be posted on the forum(SMH), which tenfar refused since he did not wanted it to spread and hence obfuscated the code. The signed firehose would present a security vulnerability if someone came in physical contact with your phone since they could dump data or load something on it without your knowledge, as pointed out on the sec blog and other posts, but it has nothing to do with whether you use tenfars tool or not.
- Smart Protect is an API feature that the an AV app would have to use, it exists in the SoC but does nothing on it's own so is irrelevant but i figured i'd clarify it (again)
Most either understand that or don't care. This is the XDA, where we break our warranties and bypass SafetyNet in order to have different emojis Thanks to tenfars tools i have noticed that ZTE has broken the FDE on their stock builds since TWRP was able to decode /data with default password even though it shouldn't. So in my book it's a net plus, at least i know how unsafe it is now.
xtermmin said:
On the US model, you can get an unlocked bootloader & all the trimmings without using tenfar's tool at all, although it's a bit more of a roundabout method.
Click to expand...
Click to collapse
Would that be this method?
http://forum.xda-developers.com/axon-7/how-to/bootloader-unlock-t3437778/page1
And thank you @peramikic for the answer. I've been googling forever on the mbn stuff but never found much on what it exactly is save that it's a manufacturer's tool. This clears up a lot for me. My biggest concern was if an mbn was something that actually rewrites code on the chip itself. Sounds like it's just an external tool a manufacturer uses to put their image onto the phone.
jawz101 said:
Would that be this method?
http://forum.xda-developers.com/axon-7/how-to/bootloader-unlock-t3437778/page1
And thank you @peramikic for the answer. I've been googling forever on the mbn stuff but never found much on what it exactly is save that it's a manufacturer's tool. This clears up a lot for me. My biggest concern was if an mbn was something that actually rewrites code on the chip itself. Sounds like it's just an external tool a manufacturer uses to put their image onto the phone.
Click to expand...
Click to collapse
No problem. The mbn itself is just a file format. In this case it has information about emmc partitions. It is also signed with proper certificate. That let's it talk to the chip and is pretty much just a low lever read/write interface.
As far as that method linked, it will work only if you are on the B20 release, US model only. The file looks for a particular build signature as well as partition signatures so it will not flash on anything else.
peramikic said:
No problem. The mbn itself is just a file format. In this case it has information about emmc partitions. It is also signed with proper certificate. That let's it talk to the chip and is pretty much just a low lever read/write interface.
As far as that method linked, it will work only if you are on the B20 release, US model only. The file looks for a particular build signature as well as partition signatures so it will not flash on anything else.
Click to expand...
Click to collapse
Yeah. At this point I think I'm too lazy to futz with downgrading, patching, then upgrading, and all that. Probably just go with the tenfar tool then 0_o
jawz101 said:
Would that be this method?
http://forum.xda-developers.com/axon-7/how-to/bootloader-unlock-t3437778/page1
Click to expand...
Click to collapse
Yeah, I used that method because I was already on B20, and my PC runs linux so :effort: to setup a Windows VM to use tenfar's tool. Using that (ZTE's official B20_Boot) and ZTE's official B20 image, you can have an unlocked BL and be on B29 without using tenfar's tool.
tl;dr: Whatever version you're on -> B20 -> B20_Boot -> unlock BL -> B20 -> OTA to B27 -> OTA to B29 (-> flash TWRP, SuperSU, whatever)

What is stopping us from unlocking the bootloader on snapdragon?

Can anyone give me an explanation as to why? The more technical the better.
Some ideas: What is stopping us from intercepting an update and forcing the update to unlock the bootloader (sorry I know not really a technical idea).
If anyone can give me some resources or point me in the right direction to understand how the bootloader works.
kevkid said:
Can anyone give me an explanation as to why? The more technical the better.
Some ideas: What is stopping us from intercepting an update and forcing the update to unlock the bootloader (sorry I know not really a technical idea).
If anyone can give me some resources or point me in the right direction to understand how the bootloader works.
Click to expand...
Click to collapse
Hi, for now I'm looking into a different but possible relevant issue of 80% charge after root. I can't really say how exactly BL is locked, but I can say where to look.
1. All the updates are signed. So far it is impossible to flash an unsigned update. So we can not modify it.
2. Samsung is publishing kernel sources but not boorloader sources. (At least not yet) so we can't 'hack' it (by hacking here I mean search for security vulnerabilities)
3. It seems Samsung is using EDKII firmware as a bootloader ( so the kernel is called from within the EFI directly )
4. I've been binwalking both kernel and abl.elf looking if they 'forgot' the debug symbols, but so far no luck.
p.s. you can find sources for G955U on samsung open source release center. The latest they have is G955USQU1AQD9.
Velaar.Felps said:
Hi, for now I'm looking into a different but possible relevant issue of 80% charge after root. I can't really say how exactly BL is locked, but I can say where to look.
1. All the updates are signed. So far it is impossible to flash an unsigned update. So we can not modify it.
2. Samsung is publishing kernel sources but not boorloader sources. (At least not yet) so we can't 'hack' it (by hacking here I mean search for security vulnerabilities)
3. It seems Samsung is using EDKII firmware as a bootloader ( so the kernel is called from within the EFI directly )
4. I've been binwalking both kernel and abl.elf looking if they 'forgot' the debug symbols, but so far no luck.
p.s. you can find sources for G955U on samsung open source release center. The latest they have is G955USQU1AQD9.
Click to expand...
Click to collapse
Excellent, so I see that you stated the kernel is called directed by the EFI. Since we have root already could we be able to modify the kernel so when the EFI loads is we can modify the bootloader or overwrite it? This alludes to my second question. What is stopping us from overwriting the BL using a rooted firmware?

Procuring original Stock ROM from Motorola

Hello XDA-mates !
I own a Moto X Play 32 GB, Dual Sim - XT1562. I had unlocked the bootloader, Flashed TWRP and rooted using SuperSu, all is well.
I no longer wish to have an unlocked bootloader and root and wanna fallback to Stock ROM with Locked bootloader.
Which as per my knowledge can be done by flashing a stock Rom.
The problem now is I am not able to find it in Motorola's portal / repository, and customer care was of no help.
'https://motorola-global-portal.custhelp.com/app/standalone/bootloader/recovery-images#'
Coming to the questions now..
- Is it necessary to flash Entire ROM package or would just flashing the recovery and bootloader by extracting it from the compressed package work as I am already on Stock ?
- Has Motorola provided Rom's For XT-1562 at-all ? (not XT-1563, its there for XT-1563)
- How can I trust Stock ROM's available on XDA forums or Github, there is no authentication / checksum ( MD5 / SHA #) nor information about the source / origin of those files.
- How did the up-loader's get those files ?
- How can I get those ROM files ? while OTA updates download ? How ?
Thank you for going through the post
KHEMS91 said:
First u need to know that, once u relock the bootloader, u can't able to unlock it and even if u relock the bootloader, u can't rid of bootloader unlocked warning (it can be hide by flashing custom bootlogo)
My suggestion is that don't worry leave it unlocked and flash custom bootlogo that can hide bootloader unlocked warning.
After do that, If u want flash stock rom, just skip logo.bin file.
There is so many nougat roms for MXP, u should try one of them.
Flash this file from AnoopKumar's thread, this can hide the bootloader unlocked warning.
Fastboot command: (fastboot flash logo logo.bin)
Mfastboot command: (mfastboot flash logo logo.bin)
Click to expand...
Click to collapse
---------------------------
Is that right ? Once locked.... bootloader cannot be unlocked again ?
arshar01 said:
---------------------------
Is that right ? Once locked.... bootloader cannot be unlocked again ?
Click to expand...
Click to collapse
I have never tried relocking but "fastboot oem lock" seems to lock in most cases.
And also, " fastboot oem unlock <UNIQUE_KEY_FOR_YOUR_DEVICE>" unlocks it and once the key is obtained it should be reusable!
Though I would request the veterans to comment on it.
---------- Post added at 12:46 PM ---------- Previous post was at 12:37 PM ----------
arshar01 said:
Hello XDA-mates !
I own a Moto X Play 32 GB, Dual Sim - XT1562. I had unlocked the bootloader, Flashed TWRP and rooted using SuperSu, all is well.
I no longer wish to have an unlocked bootloader and root and wanna fallback to Stock ROM with Locked bootloader.
Which as per my knowledge can be done by flashing a stock Rom.
The problem now is I am not able to find it in Motorola's portal / repository, and customer care was of no help.
'https://motorola-global-portal.custhelp.com/app/standalone/bootloader/recovery-images#'
Coming to the questions now..
- Is it necessary to flash Entire ROM package or would just flashing the recovery and bootloader by extracting it from the compressed package work as I am already on Stock ?
- Has Motorola provided Rom's For XT-1562 at-all ? (not XT-1563, its there for XT-1563)
- How can I trust Stock ROM's available on XDA forums or Github, there is no authentication / checksum ( MD5 / SHA #) nor information about the source / origin of those files.
- How did the up-loader's get those files ?
- How can I get those ROM files ? while OTA updates download ? How ?
Thank you for going through the post
Click to expand...
Click to collapse
I won't comment on your security concerns but I used this repository https://github.com/motoxplay/stock and it seems to work out for my Moto X play XT1562 Dual Sim 16 GB model. I am an active user of the XT1562 ROM on 7.1.1 and Build no. NPD26.48-24-1 for Asia and Dual sim. No apparent security issues faced!
Would be awaiting for more answers..
Thank you Smyaknti,
Currently I have installed Lineage, loving it.
But have downloaded the Roms from Github for any urgent future necessity.
It's strange was checking Asus site they provide all software stuff easily, even kernel source..
Wondering have I not searched enough ? they must have provided it some where... only then custom kernels were made right.. so Roms, Kernel's would be available somewhere, maybe in some specific region or some moto dev portal..
arshar01 said:
Thank you Smyaknti,
Currently I have installed Lineage, loving it.
But have downloaded the Roms from Github for any urgent future necessity.
It's strange was checking Asus site they provide all software stuff easily, even kernel source..
Wondering have I not searched enough ? they must have provided it some where... only then custom kernels were made right.. so Roms, Kernel's would be available somewhere, maybe in some specific region or some moto dev portal..
Click to expand...
Click to collapse
Here is your gateway to the Open Source heaven of Motorola!
https://github.com/MotorolaMobilityLLC
And the Nougat Sources for the Kernel of your phone!
https://github.com/MotorolaMobilityLLC/kernel-msm/tree/nougat-7.1.1-release-lux
Thank me later!

$$ BOUNTY $$ thread for ROOT on ZTE Blade A5 2019

This is a Bug bounty thread to get root on ZTE Blade A5 2019.
Thanks to ZTE this model doesn't have bootloader unlockable, so root should be made through an exploit. I'm sick of their excuses, i personally believe they were instructed by the governement to do things this way and use eula and "security" as excuse, same happened to axon 7, they said, it's because of security, and i think this is a lie (and i would say i'm not the only). Is unacceptable that experienced people that want to mod their devices can't because to unlock the bootloader you need a signed image, is unacceptable, unlocking bootloader is to flash unsigned images and you tell me that to unlock it i need a signed image from zte or the signature itself? Well i call this "lock users out of their own devices".
But returning on the root topic: I would suggest or CVE-2020-0041:https://github.com/bluefrostsecurity/CVE-2020-0041 that allowed some xperia to get root or CVE-2019-2215:https://github.com/grant-h/qu1ckr00t that has a 32bit version available here:https://forum.xda-developers.com/t/root-with-cve-2019-2215.3979341/post-80748711 another thing that could be tried is this:https://research.nccgroup.com/2022/09/02/theres-another-hole-in-your-soc-unisoc-rom-vulnerabilities/ (note that if we use this maybe would be possible to make an universal root method for unisoc getting bootrom context, but i'm not sure about that.
I also extracted kallsyms so the dev doesn't have to:https://www.mediafire.com/folder/uvde49kcna40o/ZTE_A5_2019_Stuff
Kernel Sources included since zte mirror is really slow.
N.B. Is suggested to flash an old firmware, for example Claro one has 5 January 2019 patch and because of this is vulnerable to qu1ckr00t, also it has fastboot and no updates at all.
if some dev is interested please contact (i'm not a dev so i would need one), also if people want this root to go ahead donate (I will also obliviously), you can tell how much you want to donate and after you can donate to the developer directly (these rules can be changed if the dev is trusted i guess), nb i'm not responsible for any issues, i hope won't succeed nothing badly.
I say this because i also had bad experiences.
About donations i would suggest to do those after the root process is verified to work.
I would stay fine with only a temp root
Hello, I noticed your thread while I was using my fresh script to warp pages fast. I was a person who was involved into exploiting several devices, and You can get yourself a root on this device if I put in enough time into this, Please, provide contacts so I could get in touch with you. We will discuss prices and other stuff somewhere else privately.

Categories

Resources