[XZ1c/XZ1/XZp] temp root exploit via CVE-2019-2215 including magisk setup [Locked BL]

Dematen

Member
Nov 27, 2017
28
0
1
After exploit, when I try Security test with *#*#7378423#*#* I get "None" and "Configuration" hang and crash.
Update:
Now configuration work but i see Routing status: unknow.
Camera not working with green screen.
I not have unlocked bootloader.
I have used newflasher_v36 to flash firmware after deleted persist.sin and *.ta.
Root work fine.
TA backuped but I now know if it is fine.
How recove camera?
If I update the exploit remain?
 
Last edited:

Dematen

Member
Nov 27, 2017
28
0
1
I did a system update and everything is back to normal.
This exploit doesn't seem like it was done for mine phone.
Anyway I took the opportunity to do a TA backup.
 

Dematen

Member
Nov 27, 2017
28
0
1
How I can to delete bindershell from /data/local/tmp ?
>G8441:/ $ cd /data/local/tmp
>G8441:/data/local/tmp $ chmod 755 ./bindershell
 

MonsterDroid101

New member
Dec 5, 2020
2
0
1
Hey j4ann,

It's been a long time since I've done anything like this, and I have spent days looking for an answer. Following outdated guides, broken links etc. I'm hoping you woudln't mind pointing me in the right direction, or putting an end to my torturous journey!

Can I achieve a permanent Sim Unlock with this method?

I've created a thread in Xperia XZ1 Questions & Answers, I think it would be best if I just posted the link.

 

jayloofah

Member
Apr 30, 2018
48
0
6
Got it working with G8441_47.1.A.12.205 using the same offsets as .8.49 and .16.20. I'd guess it'll work with everything in between those two.

I was too lazy to set up a build environment for the experiment so I just used a hex editor to rename the SO-02K in the ELF.
Were you able to use this method on a locked SO-02K?