• After 15+ years, we've made a big change: Android Forums is now Early Bird Club. Learn more here.

Root ZTE Zmax Pro Official Root Discussion

Status
Not open for further replies.
King is very misleading. Even at 100% it may not do anything, and rebooting is just a simple shell reboot command. Now if it booted into FTM, or EDL, that'd be better as it shows king is actively using specific commands. I'm going to catlog King and see what it does.
Have you tried some of the chinese root solutions? They may or may not be just a repackaged Kingoroot. I can do some research into it but I don't know which phone has the same specs as the zmax pro for the chinese market. As far as I know the zmax pro is exclusively for American markets...
 
Wait.. You guys just figured out BusyBox is installed? I had known that for months, just didnt think it would help without being able to use the basic root commands. So we need to change the permissions on BusyBox then?
 
I know I'm posting a lot, but whatever. From what limited information logcat gives me, it seems King is attempting to abuse the cpu cache. For what purpose, I don't know.
I noticed that from your logs too. The fact it's trying to root rather than just saying no means they have something in works.
 
Okay. So we need to change permissions. I've been trying to do that to no avail. Still unable to locate ZTE su. It's got to be in there somewhere.
 
Any of you mind installing quadrooter scanner off play store and see if it finds any exploits we can use?
2017_03_15_03.12.35.png
2017_03_15_03.11.35.png
 
{
"buildInfo": {
"fingerprint": "ZTE\/P895T20_MPCS\/urd:6.0.1\/MMB29M\/20170105.004521:user\/release-keys",
"kernelVersion": "3.10.84-perf-gcdba782-00680-g7a43ba7",
"brand": "ZTE",
"manufacturer": "ZTE",
"model": "Z981",
"release": "6.0.1",
"sdk": "23",
"builddate": 1483549457000,
"id": "MMB29M",
"cpuABI": "armeabi-v7a",
"cpuABI2": "armeabi",
"supportedABIs": [
"arm64-v8a",
"armeabi-v7a",
"armeabi"
],
"versionCode": 13,
"versionName": "v.13"
},
"results": [
{
"name": "ZipBug 9950697",
"isVulnerable": false
},
{
"name": "CVE-2013-4787",
"isVulnerable": false
},
{
"name": "ZipBug 9695860",
"isVulnerable": false
},
{
"name": "CVE-2013-6282",
"isVulnerable": false
},
{
"name": "CVE-2014-3153",
"isVulnerable": false
},
{
"name": "CVE-2014-4943",
"isVulnerable": false
},
{
"name": "WeakSauce",
"isVulnerable": false
},
{
"name": "CVE-2015-1474",
"isVulnerable": false
},
{
"name": "CVE-2015-1538-1",
"isVulnerable": false
},
{
"name": "CVE-2015-1538-2",
"isVulnerable": false
},
{
"name": "CVE-2015-1538-3",
"isVulnerable": false
},
{
"name": "CVE-2015-1538-4",
"isVulnerable": false
},
{
"name": "CVE-2015-1539",
"isVulnerable": false
},
{
"name": "CVE-2015-3824",
"isVulnerable": false
},
{
"name": "CVE-2015-3828",
"isVulnerable": false
},
{
"name": "CVE-2015-3829",
"isVulnerable": false
},
{
"name": "CVE-2015-3864",
"isVulnerable": false
},
{
"name": "sf-itunes-poc",
"isVulnerable": false
},
{
"name": "CVE-2015-3825",
"isVulnerable": false
},
{
"name": "CVE-2015-3636",
"isVulnerable": false
},
{
"name": "CVE-2015-7888",
"isVulnerable": false
},
{
"name": "CVE-2015-6608",
"isVulnerable": false
},
{
"name": "CVE-2015-6616",
"isVulnerable": false
}
]
}
 
Status
Not open for further replies.
Back
Top Bottom