Unisoc CVE-2022-38694

This commit is contained in:
melontini 2023-07-02 00:55:27 +07:00 committed by GitHub
parent 97e34c7f02
commit 946ab2638b
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -103,3 +103,7 @@ The problem is that their unlock process is similar to that of OPPO, where you h
## MediaTek ## MediaTek
If you own a MediaTek device exploitable by https://github.com/bkerler/mtkclient you can unlock the bootloader using that.<br/> If you own a MediaTek device exploitable by https://github.com/bkerler/mtkclient you can unlock the bootloader using that.<br/>
If it also happens to be an OPPO/Realme device and you need to access fastboot: https://github.com/R0rt1z2/oplus-unlock If it also happens to be an OPPO/Realme device and you need to access fastboot: https://github.com/R0rt1z2/oplus-unlock
## Unisoc
If you own a phone with the Unisoc ud710 or ums512 SOCs you can look into this exploit: https://github.com/TomKing062/CVE-2022-38694_unlock_bootloader