From 1cc3b75013ca308b7a608cee83fc00dd1e68ee9f Mon Sep 17 00:00:00 2001
From: Skorpion96 <39702358+Skorpion96@users.noreply.github.com>
Date: Fri, 22 Nov 2024 14:00:59 +0100
Subject: [PATCH] Updated Vivo and ZTE readme, check and if them look good feel
free to update them (#52)
* Update README.md
* Update README.md
* Update README.md
Finally got around to checking this in more detail.
* Update README.md
---------
Co-authored-by: melontini <104443436+melontini@users.noreply.github.com>
---
brands/vivo/README.md | 11 ++++++++++-
brands/zte/README.md | 12 +++++++++++-
2 files changed, 21 insertions(+), 2 deletions(-)
diff --git a/brands/vivo/README.md b/brands/vivo/README.md
index 3f6e546..0ecaa07 100644
--- a/brands/vivo/README.md
+++ b/brands/vivo/README.md
@@ -11,6 +11,13 @@ On pre-May 2022 firmware. I believe these methods *were* ~universal, but proceed
* Vivo x70 Pro+: [xdaforums.com][Vivo x70 Pro+]
* Vivo Y31 2021: [xdaforums.com][Vivo x70 Pro+]
+There is also a chance that your device is vulnerable to one of the MTK or Unisoc [exploits](/README.md/#universal-soc-based-methods).
+
+## Magisk
+Vivo devices have kernel-level patches to block the `su` binary, so to use Magisk you should flash this modified version with `suu`.
+- [Magisk][patched-magisk]
+- [Magisk Delta][patched-magisk-delta]
+
\* BBK Electronics was deregistered as a company on 7 April 2023.
***
@@ -18,4 +25,6 @@ Authored by [melontini](https://github.com/melontini).
[BBK Fastboot]:https://xdaforums.com/t/how-to-unlock-bootloader-of-vivo-phones.3686690/
[Vivo x70 Pro+]:https://xdaforums.com/t/vivo-x70-pro-bootloader-unlock-how-to-guide.4444989/
-[Vivo Y31 2021]:https://xdaforums.com/t/unlocking-bootloader-rebooting-in-edl-without-testpoint-vivo-y31-2021.4440801/
\ No newline at end of file
+[Vivo Y31 2021]:https://xdaforums.com/t/unlocking-bootloader-rebooting-in-edl-without-testpoint-vivo-y31-2021.4440801/
+[patched-magisk]:https://github.com/4accccc/vivo-Magisk-suu/
+[patched-magisk-delta]:https://github.com/4accccc/vivo-Magisk-Delta-suu
diff --git a/brands/zte/README.md b/brands/zte/README.md
index 893af5f..d564ead 100644
--- a/brands/zte/README.md
+++ b/brands/zte/README.md
@@ -7,7 +7,17 @@
Old devices (pre Android 8):
[xdaforums.com][pre-android-8]
+Devices Until Android 11 with engineering firmware:
+[xdaforums.com][until-android-11-few-models]
+
+There is also a chance that your device is vulnerable to one of the MTK or Unisoc [exploits](/README.md/#universal-soc-based-methods).
+
+Side note, on the A11 link there is a collection of apps to grant a system shell, but they would probably only work on old models.
+
***
+Additional info provided by [Skorpion96](https://github.com/Skorpion96).
Authored by [melontini](https://github.com/melontini).
-[pre-android-8]:https://xdaforums.com/t/bootloader-unlocking-on-older-qualcomm-zte-devices-devinfo-partition-modification.4100897/
\ No newline at end of file
+[pre-android-8]:https://xdaforums.com/t/bootloader-unlocking-on-older-qualcomm-zte-devices-devinfo-partition-modification.4100897/
+[until-android-11-few-models]:https://xdaforums.com/t/zte-blade-a5-2019-2020-etc-root-guide-locked-bootloader-valid-for-all-unisoc-zte-models-with-an-engineering-firmware.4612391/
+[unisoc-cve]:https://github.com/TomKing062/CVE-2022-38694_unlock_bootloader/releases/tag/1.72