Is it likely? If so is there a way to downgradeIf it comes directly from Amazon there is a chance the newer firmware is already installed on the device and you will not be able to take advantage of the exploit.
Is it likely? If so is there a way to downgradeIf it comes directly from Amazon there is a chance the newer firmware is already installed on the device and you will not be able to take advantage of the exploit.
You can still get vulnerable devices, even from amaz., if you have some luck
Maybe use the boot-recovery script from kamakiri folder and use adb to push files via usb cable.I flashed an old firmware, and I cannot drop files on to the firestick or use developer mode. The interface is not displaying the settings correctly.
You don't need to check/boot the OS, since the bootrom script will show a special error message if the stick is patched...Does the script that is run check the OS version of since it is a new device I won't need to worry about compatibility
Which is why you shouldn't assume.You can still get vulnerable devices, even from amaz., if you have some luck![]()
Likely, not certain. No way to downgrade so far afaik.
Thats BS.
they will give me another one, can I root it without even attach for the first time on tv? So I can avoid update?
I ordered it from Amazon will it more likely than not be vulnerableYou can still get vulnerable devices, even from amaz., if you have some luck
Maybe use the boot-recovery script from kamakiri folder and use adb to push files via usb cable.
You don't need to check/boot the OS, since the bootrom script will show a special error message if the stick is patched...
Since you ordered it already, check it out. You will see it within seconds. Nobody knows if your stick is old or new warehouse stock. Depends from which box or pallet the warehouseman grabs your stick.I ordered it from Amazon will it more likely than not be vulnerable
If I don't get one how do I know if it's old by serial number. What will a older serial look likeSince you ordered it already, check it out. You will see it within seconds. Nobody knows if your stick is old or new warehouse stock. Depends from which box or pallet the warehouseman grabs your stick.
If you want to be sure, walk into shops and compare serial numbers, try to find old stock.
You can ask some users here or in a new thread for the serial from vulnerable sticks, then compare it with the one you get from amazon. Take a look in this thread for serials, can't recall but I guess I saw some serials somewhere.If I don't get one how do I know if it's old by serial number. What will a older serial look like
It's not BS, it's a fact.Thats BS.
I was answering to the following question, and I said yes, try it first...
Since he gets the new device anyways, why he shouldn't try the unlock first?
It doesn't hurt at all and after that we don't have to assume something, since he will see if it's patched or not...
"try the unlock first" isn't the same as "the unlock will work fine"It's not BS, it's a fact.
You answered a question about rooting. You answered yes with a thumbs up and to try to unlock first. This gives the impression that it would all work out.
Liked your posting yesterday, for pointing this out...In conclusion, i was simply trying to be clear that there is a condition to be met and to temper the expectations of it working since it all depends on the version he gets. No reason to be offended.
but forgot to like this one, really helpful and very nice. Thank you very much.
... successfully rooted/flashed it (DSN number G071CQ132062xxxx).
DSN G071CQ152287xxxx RuntimeError: ERROR: Serial protocol mismatch, expected 0000 got 2001
@Miguel_hrvs : can you still check the DSN number? Would be interesting since I still found G071CQ132062xxxx sheldon in a store and wonder if my assumption those might still be unlockable is correct?Like others said, buying new tv sticks unpatched is becoming impossible. I bought two new ones and I get the serial protocol mismatch error, expected 0000 got 2001. We will need to find a new way to unlock the bootloader.
You would need an otg adapter and an usb mouse or even better a keyboard with touchpad, if you like to use the TWRP GUI.1. When I have used TWRP it says swipe to confirm flash how do you swipe on a remote or is it different.
If you don't disable OTA updates, the fireOS will download and install full updates via TWRP.2. After it is unlocked is fire os still accessable to download the zip to be able to flash it. Or must it be transferred another way?
If it updates or doesn't matter since it already unlocked correctYou would need an otg adapter and an usb mouse or even better a keyboard with touchpad, if you like to use the TWRP GUI.
Another option is to use TWRP commandline via ADB shell over an usb connection to your PC. In this case there is no need for any swipes...
If you don't disable OTA updates, the fireOS will download and install full updates via TWRP.
You will see some errors too, since the fireOS downloads partial diff updates first, which won't install via TWRP.
This is for Sheldon not mantis
All who have bought in the last months please report:
1) model (sheldon/p)
2) DSN number first 4-6 numbers after G071CQ (label at the bottom of the package, maybe different for sheldonp)
3) unlocking successful or unsuccessful
So maybe we can use this number to avoid opening the package when unlocking is unlikely, so to easier exchange for an older version.
Make sure that you run all steps from sheldon OP with sudo and use the latest kamakiri zip for mantis (works not for fireOS 6.2.8.7 and above).@Sus_i
I'm here following the suggestion from the 4k thread. I wanted to say running ubuntu 16.04 following the steps bootrom-step.sh is waiting for device, the stick does mount in the desktop as AFTMM but there are no contents.
Should I be using a later Ubuntu?
aax-eu.amazon-adsystem.com
ab9hgnqkqtwh.eu.api.amazonvideo.com
api.amazon.com
api.github.com
arcus-uswest.amazon.com
aviary.amazon.de
beb3d20a-dnsotls-ds.metric.gstatic.com
cad9828c-dnsotls-ds.metric.gstatic.com
cdn-gl.imrworldwide.com
config.ioam.de
d3h5bk8iotgjvw.cloudfront.net
dcape-na.amazon.com
det-ta-g7g.amazon.com
device-messaging-na.amazon.com
device-metrics-us.amazon.com
dp-discovery-na-ext.amazon.com
dp-gw-na.amazon.com
freetimecaptiveportal.com
ftv-smp.ntp-fireos.com
ktpx-eu.amazon.com
mas-ext-eu.amazon.com
mas-sdk.amazon.com
mobile-data.onetrust.io
msh.amazon.co.uk
prod.amazoncrl.com
prod.us-east-1.sonar.prime-video.amazon.dev
softwareupdates.amazon.com
suggestqueries.google.com
unagi-eu.amazon.com
usji9q-dnsotls-ds.metric.gstatic.com
wl.amazon-dss.com
post says FireOs < 7.2.7.3 but My FireOs is 7.6.x.xyou must have the FireOS version required in the first post.
You need to have a linux live system or a installed linux beacause the exploit need some installed packages which is unavailable in wsl.
you can't do this if you install the latest amzn firmware
Had a look into all fw bin's, TZ is the same until the newest 7.2.7.3 got an updated one...Yeah, probably just needs a more recent FireOS installed the TZ in kamakiri is from 7.2.4.9
adb shell
su
pm disable com.amazon.device.software.ota
pm disable com.amazon.device.software.ota.override
pm disable com.amazon.tv.forcedotaupdater.v2
exit
exit
adb shell
resetprop ro.product.device sheldonp
exit
No, the Max isn't vulnerable to the preloader-exploit@k4y0z will a similar unlocking method be used for the Max once we receive the 7.2.7.3 update?
@SweenWolf thanks for your suggested fix . . . appreciate your work (and that of your good mate TDUKOpen TWRP, then mount /system, go to file explorer, go to navigate to priv-app and delete the folder
"com.amazon.device.software.ota"
Usually you should be good to go now, but goto /data/app and check for same folder (it will have something as suffix) if its present then delete it, your ota should be blocked.
Could be that this is TZ related...I have the same problem since I flashed only TWRP alone and didn't installed anything on it just to be sure that my sheldon don't update ,Now any application who try to check DRM on stock firmware cause a bug and a reboot of the system. like netflix and disney+ or live tv with DRM..