Root MediaTek devices using mtk-su
exploit (CVE-2020-0069).
- Python 3.9 or newer(in %PATH% for Windows).
- ADB (in %PATH% for Windows).
- The CVE-2020-0069 PoC (
mtk-su
).
- Download the mtk-su binaries from the MediaTek's SU XDA page and move them to their corresponding folders (
automated_root/files/arm[64]
). - Download the latest release of the tool.
- If you're using Windows, open a PowerShell. If you're using Linux open a Terminal.
- Install the requirements with
pip3 install -r requirements.txt
. - Run the script with Python:
python3 mtk-su.py
.
- Root the device. (system-mode + SuperSU).
- Root the device. (bootless-mode + Magisk).
- Unroot the device. (supports both bootless and system mode).
- This tool is licensed under the GNU (v3) General Public License. See
LICENSE
for more details. files/common/Initd.apk
is property of RYO Software.files/common/Magisk.apk
andfiles/arm[64]/magiskinit
are property of topjohnwu.files/common/SuperSU.apk
andfiles/arm[64]/{libsupol.so,su,supolicy}
are property of Chainfire.
- diplomatic (XDA): the creator of the
mtk-su
(CVE-2020-0069) exploit and themagisk-boot.sh
script. - RYO Software: the creator of the Init.d Support App.
- Chainfire: the creator of SuperSU (and its binaries).
- topjohnwu: the creator of Magisk (and its binaries).