AutomatedRoot
AutomatedRoot copied to clipboard
Root your MediaTek device with CVE-2020-0069
AutomatedRoot
Root MediaTek devices using mtk-su exploit (CVE-2020-0069).
Requirements
- Python 3.9 or newer(in %PATH% for Windows).
- ADB (in %PATH% for Windows).
- The CVE-2020-0069 PoC (
mtk-su).
Usage
- Download the mtk-su binaries from the MediaTek's SU XDA page and move them to their corresponding folders (
automated_root/files/arm[64]). - Download the latest release of the tool.
- If you're using Windows, open a PowerShell. If you're using Linux open a Terminal.
- Install the requirements with
pip3 install -r requirements.txt. - Run the script with Python:
python3 mtk-su.py.
Available options
- Root the device. (system-mode + SuperSU).
- Root the device. (bootless-mode + Magisk).
- Unroot the device. (supports both bootless and system mode).
License
- This tool is licensed under the GNU (v3) General Public License. See
LICENSEfor more details. files/common/Initd.apkis property of RYO Software.files/common/Magisk.apkandfiles/arm[64]/magiskinitare property of topjohnwu.files/common/SuperSU.apkandfiles/arm[64]/{libsupol.so,su,supolicy}are property of Chainfire.
Special thanks
- diplomatic (XDA): the creator of the
mtk-su(CVE-2020-0069) exploit and themagisk-boot.shscript. - RYO Software: the creator of the Init.d Support App.
- Chainfire: the creator of SuperSU (and its binaries).
- topjohnwu: the creator of Magisk (and its binaries).