From 946ab2638b7809a6427f2ea6e3a2f8af1ecf6eac Mon Sep 17 00:00:00 2001 From: melontini <104443436+melontini@users.noreply.github.com> Date: Sun, 2 Jul 2023 00:55:27 +0700 Subject: [PATCH] Unisoc CVE-2022-38694 --- README.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/README.md b/README.md index 0793e1e..454d4e8 100644 --- a/README.md +++ b/README.md @@ -103,3 +103,7 @@ The problem is that their unlock process is similar to that of OPPO, where you h ## MediaTek If you own a MediaTek device exploitable by https://github.com/bkerler/mtkclient you can unlock the bootloader using that.
If it also happens to be an OPPO/Realme device and you need to access fastboot: https://github.com/R0rt1z2/oplus-unlock + +## Unisoc + +If you own a phone with the Unisoc ud710 or ums512 SOCs you can look into this exploit: https://github.com/TomKing062/CVE-2022-38694_unlock_bootloader