can anyone give this a try for me
http://androidforums.com/threads/ne...s-with-the-new-sdcard-update-from-zte.786236/
"***So basically the key to rooting successfully is that you hold down on volume up on each 1st reboot attempt to boot to FTM and then let it boot normally if it is the 2nd or 3rd reboot for the current exploit it tries. Mine was successful after the 2nd exploit it ran so I only had to boot to FTM Twice. The total process took me about 3-4 minutes. If someone wants to help with more detailed instructions I am sure a lot of less experienced Android users could benefit from them."
im assuming we are going at this wrong. ive been trying adb shell and trying to get su for a while as long as these threads were up, i try to chime in when i have some insight but from here they basically go into FTM (maybe for some privileges that are not accessed in standard boot) after the initial reboot that is supposed to take place to finish up any root process. they worked around their restrictions. im now going to be trying different methods to maybe force a way in like how they have done. kingroot gets to 95% then fails but even if kingroot can get root its still root. and also im grabbing a copy of the b012 update. they pulled it back for some odd reason(they claim it defected more phones than fixed which is a bullshit reason to pull a complete OTA update) so im going to further investigate that build and see if there are any vulnerabilities because thats why im assuming they pulled it and then b014 will be out soon... b014 they wont slip up on but b012 i think they did. so we have 2 leads better than nothing. one is to try different brute methods of manipulation and the second is to find vulnerabilities within build b012 and see if there is something changed or a door we can put our foot in.