diff --git a/README.md b/README.md index 0793e1e..454d4e8 100644 --- a/README.md +++ b/README.md @@ -103,3 +103,7 @@ The problem is that their unlock process is similar to that of OPPO, where you h ## MediaTek If you own a MediaTek device exploitable by https://github.com/bkerler/mtkclient you can unlock the bootloader using that.<br/> If it also happens to be an OPPO/Realme device and you need to access fastboot: https://github.com/R0rt1z2/oplus-unlock + +## Unisoc + +If you own a phone with the Unisoc ud710 or ums512 SOCs you can look into this exploit: https://github.com/TomKing062/CVE-2022-38694_unlock_bootloader