• After 15+ years, we've made a big change: Android Forums is now Early Bird Club. Learn more here.

Root ZTE Zmax Pro Official Root Discussion

Status
Not open for further replies.
Actually, the Quadroot exploits have been around for quite some time. I just don't have the know-how to make any use of them. edit: Apparently my autocorrect thinks I want to type a racial slur when I type Quadroot.
 
Last edited:
Selinux disabling requires root, but as far as the cves there are some exploits that can be used that were created of quadrooter exploits.

Only issue is now the pro cannot be systemless rooted because of its bootloader.

So we will have to send a older su file to temp then copy to xbin, at that point we will have root and upload a recovery.

Since I don't have the device I can't try anything so I'll leave that info available for now
 
Selinux disabling requires root, but as far as the cves there are some exploits that can be used that were created of quadrooter exploits.

Only issue is now the pro cannot be systemless rooted because of its bootloader.

So we will have to send a older su file to temp then copy to xbin, at that point we will have root and upload a recovery.

Since I don't have the device I can't try anything so I'll leave that info available for now
Do we have links to the exploits?
 
loonycgb2Selinux disabling requires root, but as far as the cves there are some exploits that can be used that were created of quadrooter exploits.Only issue is now the pro cannot be systemless rooted because of its bootloader.So we will have to send a older su file to temp then copy to xbin, at that point we will have root and upload a recovery.Since I don't have the device I can't try anything so I'll leave that info available for now
Do we have links to the exploits?
If you're on a zte z981 phone get the zonealarm quadroot scanner and it will give you the links.
 
Last edited:
CVE-2017-0475 Elevation of privilege vulnerability in recovery verifier
An elevation of privilege vulnerability in the recovery verifier could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device.
Release Date: 2017-03-07
Affected Systems:
Google Android 7.1.1
Google Android 7.0
Google Android 6.0.1
Google Android 6.0
Google Android 5.1.1
Google Android 5.0.2
Google Android 4.4.4
 
As getting root on B08 will give us a pathway to rooting B14, my spare 981 can be used. If anyone has any tools, scripts, etc, I'll try any CVE out on it. I don't care about bricks either.
 
As getting root on B08 will give us a pathway to rooting B14, my spare 981 can be used. If anyone has any tools, scripts, etc, I'll try any CVE out on it. I don't care about bricks either.
Mine is vulnerable to
cve-2016-2504
Cve-2016-2059
Looking at the dirty cow an ened up with a root.sh but don't have a PC running Linux
 
Status
Not open for further replies.
Back
Top Bottom