As jcase told us, this exploit does not give you system write access. As you can see from your screenshot, Xposed is attempting to mount /system writable.I keep getting this error, how did you get around it?
![]()
Sent from my Moto X
As jcase told us, this exploit does not give you system write access. As you can see from your screenshot, Xposed is attempting to mount /system writable.I keep getting this error, how did you get around it?
![]()
Sent from my Moto X
When you first open xposed do NOT choose classical install. Choose the normal install, then SOFT reboot. Install your modules and ONLY SOFT REBOOT or you'll loose root.As jcase told us, this exploit does not give you system write access. As you can see from your screenshot, Xposed is attempting to mount /system writable.
Confirmed working on Droid MAXX. If you have already updated to 19.6.3, you MUST revert back to 19.5.3. Here are a few quick instructions if you're not sure how to do this.
Confirmed rolling back to 19.5.3 on the Droid Ultra does allow this root method to work.Thx for the exploit @jcase I'll downgrade to 19.5.3 tomorrow, verify root and make my bounty payment.. Thx again man!! I guarantee one thing that no one will ever catch my ass doing again.. Buy a carrier specific phone!!
He said in the OP that the vulnerability was patched on the 4.4.3 update.works with 4.4.3???
somone tested it?
wich comands i must make?
i didn t understand very well
with ADB?
there is no NORMAL. there is only Clasic and RecoveryWhen you first open xposed do NOT choose classical install. Choose the normal install, then SOFT reboot. Install your modules and ONLY SOFT REBOOT or you'll loose root.
I've already installed GravityBox, and a few other modules. Oh how I've missed xposed! It's really the only reason I like having root.
Sent from my XT1080 using XDA Premium HD app
you're trying to enter the commands from within adb shell which is probably why you're getting adb not found. The push commands should be from the command prompt itself.there is no NORMAL. there is only Clasic and Recovery
someone knows what i do wrong?
![]()
No. SafeStrap requires the ability to write to system to install the hooks.I was wondering if safestrap could be installed with this, but I'm not sure it will. But we're getting closer! I'll try this on my 4.4.2 RAZR m.
Sent from my Galaxy Nexus using XDA Free mobile app
yesGreat work, jcase!
Now guys, even if this root doesn't allow writing to /system, some Xposed modules would still work, right?
Thanks! Where can I find this script?yes
i make it W/R with a script and Gravity Box working fine
attention to soft reboot
Inviato dal mio XT1052 utilizzando Tapatalk
Could someone please post a step by step on how to obtain root? I can't find instructions anywhere...Thanks! Where can I find this script?
Well I've acquired root on many devices before and was always able to figure it out. I just don't see where to put the zip file. I can run the code posted through Command prompt that's not hard I'm just missing a clear instruction to know if I'm doing it right I've already flashed back to the pre-April release. I just need some explanation not a ton.Ya, first post.. If you don't understand that, you probably shouldn't root
Sent from my XT1060 using Tapatalk
The files needed to copy to the phone are in the zip file. Just unzip it.Well I've acquired root on many devices before and was always able to figure it out. I just don't see where to put the zip file. I can run the code posted through Command prompt that's not hard I'm just missing a clear instruction to know if I'm doing it right I've already flashed back to the pre-April release. I just need some explanation not a ton.
You need to downgrade to 19.5.3C:\>adb push pie.jar /data/local/atvc
4783 KB/s (1538138 bytes in 0.314s)
C:\>adb push root.sh /data/local/atvc
62 KB/s (192 bytes in 0.003s)
C:\>adb shell chmod 755 /data/local/atvc/root.sh
C:\>adb shell /data/local/atvc/root.sh
rm failed for /data/local/atvc/blop.asec, No such file or directory
mkdir failed for /data/local/atvc/dalvik-cache, File exists
pie by jcase
want to buy me pie? paypal-> [email protected]
XT1080 Ultra firmware 19.6.3 android 3.3
put it anywhere, as long as you unzip it and run the contained files on the device from /data/local/atvcWell I've acquired root on many devices before and was always able to figure it out. I just don't see where to put the zip file. I can run the code posted through Command prompt that's not hard I'm just missing a clear instruction to know if I'm doing it right I've already flashed back to the pre-April release. I just need some explanation not a ton.