mirror of
https://github.com/melontini/bootloader-unlock-wall-of-shame.git
synced 2025-01-22 19:41:20 -05:00
Unisoc CVE-2022-38694
This commit is contained in:
parent
97e34c7f02
commit
946ab2638b
@ -103,3 +103,7 @@ The problem is that their unlock process is similar to that of OPPO, where you h
|
||||
## MediaTek
|
||||
If you own a MediaTek device exploitable by https://github.com/bkerler/mtkclient you can unlock the bootloader using that.<br/>
|
||||
If it also happens to be an OPPO/Realme device and you need to access fastboot: https://github.com/R0rt1z2/oplus-unlock
|
||||
|
||||
## Unisoc
|
||||
|
||||
If you own a phone with the Unisoc ud710 or ums512 SOCs you can look into this exploit: https://github.com/TomKing062/CVE-2022-38694_unlock_bootloader
|
||||
|
Loading…
Reference in New Issue
Block a user