Root Exploit on Samsung Devices Using Exynos Chips

Posted on Updated on

A root exploit has been discovered on the XDA-Developers forum by member alephzain. They state that this exploit works without having to flash the ROM using ODIN.

alephzain explains that the Exynos device file in the kernel /dev/exynos-mem allows read/write permissions to all users. Many have suggested that a simple fix would be to change the permissions to chmod value 0660 or 0600. Though forum member AndreiLux suggest that this may disrupt camera services on the device and a better solution involving “limit[ing] the access to the DMA memory spaces”

Then …. yes, :) a point and click exploit APK program has been made to allow users to run the exploit and obtain super user privileges. It also allows you to patch the exploit and un-patch it as well. The APK file has been posted on the XDA-Developers thread, authored by Chainfire.

On a side note, the name “alephzain” kind of translates to “thousand good” or “a thousand good things” :)

** EDIT **
Just used Chainfire’s exploit APP. Works like a charm on my Samsung Galaxy S3! Now I can use the firewall to block apps from getting ads.

2 thoughts on “Root Exploit on Samsung Devices Using Exynos Chips

    Alexi Akl said:
    September 2, 2013 at 10:34 am

    Fast and clean, thanks for the tip ;)

      geodma responded:
      September 2, 2013 at 1:10 pm

      You’re welcome man, just a word of warning, if you update your droid the phone will no longer be rooted.

Leave a Comment

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s