No-Odin Root Exploit Found for Exynos 4412 and 4210
Posted December 17, 2012 at 01:30 am by Former Writer
Root exploits are often quite a good thing. There are many that only work on certain individual devices. However, there are some that work on a whole bunch of devices. An example of the latter is a root exploit by XDA Recognized Developer Bin4ry that works on a variety of devices. And now we have news of a dangerous, new exploit that works on Exynos 4210- and 4412-based devices.
XDA Forum Member alephzain released the exploit that affects pretty much any device with an Exynos 4412 or 4210 processor. This includes the Samsung Galaxy Note II, Samsung Galaxy S III, Meizu MX, and the Galaxy S II, among many others. Here’s how alephzain explains the root method:
Recently discover a way to obtain root on S3 without ODIN flashing.
The security hole is in kernel, exactly with the device /dev/exynos-mem.
This device is R/W by all users and give access to all physical memory … what’s wrong with Samsung ?
Its like /dev/mem but for all.
Three libraries seems to use /dev/exynos-mem:
Essentially, this exploit can be used to root any device with the aforementioned processors. What’s more, this method wouldn’t require an Odin flash like most current root methods. However, this exploit could be dangerous. Not only could be used to acquire root access, but for malicious applications as well. So developers will have a fun time helping to fix the issues while using the exploit for root.
For more details, check out the original thread. Do keep in mind, though, that this is posted in the new Samsung Galaxy Note II developer-only forum, so don’t post saying thanks or anything as the thread will be used for developers to develop things only.
Want something on the XDA Portal? Send us a tip!