From 1cc3b75013ca308b7a608cee83fc00dd1e68ee9f Mon Sep 17 00:00:00 2001 From: Skorpion96 <39702358+Skorpion96@users.noreply.github.com> Date: Fri, 22 Nov 2024 14:00:59 +0100 Subject: [PATCH] Updated Vivo and ZTE readme, check and if them look good feel free to update them (#52) * Update README.md * Update README.md * Update README.md Finally got around to checking this in more detail. * Update README.md --------- Co-authored-by: melontini <104443436+melontini@users.noreply.github.com> --- brands/vivo/README.md | 11 ++++++++++- brands/zte/README.md | 12 +++++++++++- 2 files changed, 21 insertions(+), 2 deletions(-) diff --git a/brands/vivo/README.md b/brands/vivo/README.md index 3f6e546..0ecaa07 100644 --- a/brands/vivo/README.md +++ b/brands/vivo/README.md @@ -11,6 +11,13 @@ On pre-May 2022 firmware. I believe these methods *were* ~universal, but proceed * Vivo x70 Pro+: [xdaforums.com][Vivo x70 Pro+] * Vivo Y31 2021: [xdaforums.com][Vivo x70 Pro+] +There is also a chance that your device is vulnerable to one of the MTK or Unisoc [exploits](/README.md/#universal-soc-based-methods). + +## Magisk +Vivo devices have kernel-level patches to block the `su` binary, so to use Magisk you should flash this modified version with `suu`. +- [Magisk][patched-magisk] +- [Magisk Delta][patched-magisk-delta] + \* BBK Electronics was deregistered as a company on 7 April 2023. *** @@ -18,4 +25,6 @@ Authored by [melontini](https://github.com/melontini). [BBK Fastboot]:https://xdaforums.com/t/how-to-unlock-bootloader-of-vivo-phones.3686690/ [Vivo x70 Pro+]:https://xdaforums.com/t/vivo-x70-pro-bootloader-unlock-how-to-guide.4444989/ -[Vivo Y31 2021]:https://xdaforums.com/t/unlocking-bootloader-rebooting-in-edl-without-testpoint-vivo-y31-2021.4440801/ \ No newline at end of file +[Vivo Y31 2021]:https://xdaforums.com/t/unlocking-bootloader-rebooting-in-edl-without-testpoint-vivo-y31-2021.4440801/ +[patched-magisk]:https://github.com/4accccc/vivo-Magisk-suu/ +[patched-magisk-delta]:https://github.com/4accccc/vivo-Magisk-Delta-suu diff --git a/brands/zte/README.md b/brands/zte/README.md index 893af5f..d564ead 100644 --- a/brands/zte/README.md +++ b/brands/zte/README.md @@ -7,7 +7,17 @@ Old devices (pre Android 8):
[xdaforums.com][pre-android-8] +Devices Until Android 11 with engineering firmware:
+[xdaforums.com][until-android-11-few-models] + +There is also a chance that your device is vulnerable to one of the MTK or Unisoc [exploits](/README.md/#universal-soc-based-methods). + +Side note, on the A11 link there is a collection of apps to grant a system shell, but they would probably only work on old models. + *** +Additional info provided by [Skorpion96](https://github.com/Skorpion96). Authored by [melontini](https://github.com/melontini). -[pre-android-8]:https://xdaforums.com/t/bootloader-unlocking-on-older-qualcomm-zte-devices-devinfo-partition-modification.4100897/ \ No newline at end of file +[pre-android-8]:https://xdaforums.com/t/bootloader-unlocking-on-older-qualcomm-zte-devices-devinfo-partition-modification.4100897/ +[until-android-11-few-models]:https://xdaforums.com/t/zte-blade-a5-2019-2020-etc-root-guide-locked-bootloader-valid-for-all-unisoc-zte-models-with-an-engineering-firmware.4612391/ +[unisoc-cve]:https://github.com/TomKing062/CVE-2022-38694_unlock_bootloader/releases/tag/1.72