cc @AndroidAuth @AndroidPolice @androidandme @Androidheadline @AndroidPolice @xdadevelopers @AndroidSPIN @Gadgets360 @TheHackersNews you have a subject here to write an article. It's not normal to have this kind of backdoor in an end user product...
-
-
But granting ADB root still means that the exploiter needs ADB access in the first place, right? So it's not like a random app can exploit this then wreck havoc with root access—only someone with physical ADB access.
-
Yes you're right. However there are other implications. When the "magic intent" is executed it set the system property oem.selinux.reload_policy to 1. There is also an "engineer mode" which correspond to persist.sys.adb.engineermode
-
So for now, it too early to speak about a random app getting root access but we are on the good tracks
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.
.
The OnePlus root application is coming soon :)