[Q] Possible to mod the T-Mobile G2 and Desire Z/HD "gfree" exploit?

Search This thread

qzfive

Senior Member
Aug 8, 2010
209
49
After obtaining temproot and posting my thread on how to get it, I tried the "gfree" exploit that was used on the MyTouch 4G/T-mobile G2/Desire Z/Desire HD. However, I had no luck.

Basically, what it did was exploit a security hole in an early radio firmware on those phones, and through exploiting this way, it was able to power down the eMMC chip, dropping its write protection. After that, it was possible to modify the CID, SIM-lock and bootloader security status. It could do each seperate, or all at the same time.

I pushed the gfree binary to my Chacha and tried running it, and as I predicted, it failed at the part it tries to power cycle the eMMC chip. Would any dev be able to take the binary, modify it and try to find such a hole on the Chacha? I tried finding source for it, but I was unsuccessful, so it may be a bit harder :(


EDIT: Right after posting this, I've come across what appears to be such source - https://github.com/tmzt/g2root-kmod/tree/master/scotty2/gfree
 
Last edited:

xd.bx

Senior Member
May 14, 2011
431
292
I don't think it can ever work -- the ChaCha like older HTC phones has a specific radio NAND, not an eMMC chip. The gfree exploit power-cycles the eMMC through GPIO 88 in order to reset it to its "everything is writable" state.

What would work is an HBOOT exploit, like unrevoked or AlphaRevX (both are probably patched in the latest HBOOT version).

EDIT: in addition, the gfree exploit binary is compiled for the ARMv7 architecture, which has a different ISA than ARMv6 (the MSM7227 in the ChaCha is based on ARMv6).
 
Last edited: