Pwoof! Dusty thread.
Heads up to anyone who is still interested, an implementation of CVE-2019-16253 has been made by a developer named K0mraid3. Among the devices that this system shell (not root) works on is our J7 Crown! This is a privilege escalation exploit that grants an adb shell system level access.
While this exploit does not grant root level access on its own, it could be a very valuable tool in escalating further, and it is super easy to use!
Edit:
Oh! I have been doing the exploit wrong. so you are supposed to use version 3.0.02.2 of tts, I have been using 3.0.00.86 which gives a whole slew of different permission groups including 1015(sdcard_rw),1023(media_rw) and 1024(mtp). This version doesn't work on newer devices, but for the device I have it allows ls on root XD
Chears