Updated Vivo and ZTE readme, check and if them look good feel free to update them (#52)

* Update README.md

* Update README.md

* Update README.md

Finally got around to checking this in more detail.

* Update README.md

---------

Co-authored-by: melontini <104443436+melontini@users.noreply.github.com>
This commit is contained in:
Skorpion96 2024-11-22 14:00:59 +01:00 committed by GitHub
parent 97e345ded0
commit 1cc3b75013
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
2 changed files with 21 additions and 2 deletions

View File

@ -11,6 +11,13 @@ On pre-May 2022 firmware. I believe these methods *were* ~universal, but proceed
* Vivo x70 Pro+: [xdaforums.com][Vivo x70 Pro+] * Vivo x70 Pro+: [xdaforums.com][Vivo x70 Pro+]
* Vivo Y31 2021: [xdaforums.com][Vivo x70 Pro+] * Vivo Y31 2021: [xdaforums.com][Vivo x70 Pro+]
There is also a chance that your device is vulnerable to one of the MTK or Unisoc [exploits](/README.md/#universal-soc-based-methods).
## Magisk
Vivo devices have kernel-level patches to block the `su` binary, so to use Magisk you should flash this modified version with `suu`.
- [Magisk][patched-magisk]
- [Magisk Delta][patched-magisk-delta]
\* BBK Electronics was deregistered as a company on 7 April 2023. \* BBK Electronics was deregistered as a company on 7 April 2023.
*** ***
@ -19,3 +26,5 @@ Authored by [melontini](https://github.com/melontini).
[BBK Fastboot]:https://xdaforums.com/t/how-to-unlock-bootloader-of-vivo-phones.3686690/ [BBK Fastboot]:https://xdaforums.com/t/how-to-unlock-bootloader-of-vivo-phones.3686690/
[Vivo x70 Pro+]:https://xdaforums.com/t/vivo-x70-pro-bootloader-unlock-how-to-guide.4444989/ [Vivo x70 Pro+]:https://xdaforums.com/t/vivo-x70-pro-bootloader-unlock-how-to-guide.4444989/
[Vivo Y31 2021]:https://xdaforums.com/t/unlocking-bootloader-rebooting-in-edl-without-testpoint-vivo-y31-2021.4440801/ [Vivo Y31 2021]:https://xdaforums.com/t/unlocking-bootloader-rebooting-in-edl-without-testpoint-vivo-y31-2021.4440801/
[patched-magisk]:https://github.com/4accccc/vivo-Magisk-suu/
[patched-magisk-delta]:https://github.com/4accccc/vivo-Magisk-Delta-suu

View File

@ -7,7 +7,17 @@
Old devices (pre Android 8):<br/> Old devices (pre Android 8):<br/>
[xdaforums.com][pre-android-8] [xdaforums.com][pre-android-8]
Devices Until Android 11 with engineering firmware:<br/>
[xdaforums.com][until-android-11-few-models]
There is also a chance that your device is vulnerable to one of the MTK or Unisoc [exploits](/README.md/#universal-soc-based-methods).
Side note, on the A11 link there is a collection of apps to grant a system shell, but they would probably only work on old models.
*** ***
Additional info provided by [Skorpion96](https://github.com/Skorpion96).
Authored by [melontini](https://github.com/melontini). Authored by [melontini](https://github.com/melontini).
[pre-android-8]:https://xdaforums.com/t/bootloader-unlocking-on-older-qualcomm-zte-devices-devinfo-partition-modification.4100897/ [pre-android-8]:https://xdaforums.com/t/bootloader-unlocking-on-older-qualcomm-zte-devices-devinfo-partition-modification.4100897/
[until-android-11-few-models]:https://xdaforums.com/t/zte-blade-a5-2019-2020-etc-root-guide-locked-bootloader-valid-for-all-unisoc-zte-models-with-an-engineering-firmware.4612391/
[unisoc-cve]:https://github.com/TomKing062/CVE-2022-38694_unlock_bootloader/releases/tag/1.72