Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-0069 PoC — Google Android Mediatek Command Queue driver 缓冲区错误漏洞

Source
Associated Vulnerability
Title:Google Android Mediatek Command Queue driver 缓冲区错误漏洞 (CVE-2020-0069)
Description:In the ioctl handlers of the Mediatek Command Queue driver, there is a possible out of bounds write due to insufficient input sanitization and missing SELinux restrictions. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147882143References: M-ALPS04356754
Description
Root your MediaTek device with CVE-2020-0069
Readme
# AutomatedRoot
![GitHub](https://img.shields.io/github/license/R0rt1z2/AutomatedRoot)
![GitHub release (latest by date including pre-releases)](https://img.shields.io/github/v/release/R0rt1z2/AutomatedRoot?include_prereleases)
![GitHub All Releases](https://img.shields.io/github/downloads/R0rt1z2/AutomatedRoot/total)
[![GitHub Maintained](https://img.shields.io/badge/maintained-yes-purple.svg)](https://github.com/R0rt1z2/AutomatedRoot)
![GitHub Issues](https://img.shields.io/bitbucket/issues-raw/R0rt1z2/AutomatedRoot?color=red)
![Github Contributors](https://img.shields.io/github/contributors/R0rt1z2/AutomatedRoot)

Root MediaTek devices using `mtk-su` exploit (**CVE-2020-0069**).

## Requirements
* Python 3.9 or newer(in %PATH% for Windows).
* ADB (in %PATH% for Windows).
* The **CVE-2020-0069** PoC (`mtk-su`).

## Usage
* Download the mtk-su binaries from the [MediaTek's SU XDA page](https://forum.xda-developers.com/t/amazing-temp-root-for-mediatek-armv8-2020-08-24.3922213/) and move them to their corresponding folders (`automated_root/files/arm[64]`).
* Download the [latest release of the tool](https://github.com/R0rt1z2/AutomatedRoot/releases).
* If you're using Windows, open a PowerShell. If you're using Linux open a Terminal.
* Install the requirements with `pip3 install -r requirements.txt`.
* Run the script with Python: `python3 mtk-su.py`.

## Available options
1. Root the device. (system-mode + SuperSU).
2. Root the device. (bootless-mode + Magisk).
3. Unroot the device. (supports both bootless and system mode).

## License
* This tool is licensed under the GNU (v3) General Public License. See `LICENSE` for more details.
* `files/common/Initd.apk` is property of RYO Software.
* `files/common/Magisk.apk` and `files/arm[64]/magiskinit` are property of topjohnwu.
* `files/common/SuperSU.apk` and `files/arm[64]/{libsupol.so,su,supolicy}` are property of Chainfire.

## Special thanks
* diplomatic (XDA): the creator of the `mtk-su` (CVE-2020-0069) exploit and the `magisk-boot.sh` script.
* RYO Software: the creator of the Init.d Support App.
* Chainfire: the creator of SuperSU (and its binaries).
* topjohnwu: the creator of Magisk (and its binaries).
File Snapshot

[4.0K] /data/pocs/322d955e61ddb807d9691cfafecb5cff0adfdad6 ├── [4.0K] automated_root │   ├── [4.0K] files │   │   ├── [4.0K] arm │   │   │   ├── [198K] libsupol.so │   │   │   ├── [373K] magiskinit │   │   │   ├── [ 74K] su │   │   │   └── [ 41K] supolicy │   │   ├── [4.0K] arm64 │   │   │   ├── [327K] libsupol.so │   │   │   ├── [393K] magiskinit │   │   │   ├── [106K] su │   │   │   └── [ 42K] supolicy │   │   └── [4.0K] common │   │   ├── [2.8M] Initd.apk │   │   ├── [3.0M] Magisk.apk │   │   ├── [3.4K] magisk-boot.sh │   │   ├── [ 782] magisk-root.sh │   │   ├── [2.2K] root.sh │   │   ├── [6.1M] SuperSU.apk │   │   └── [1.8K] unroot.sh │   ├── [ 5] __init__.py │   └── [4.0K] utils │   ├── [1.6K] config.py │   ├── [3.2K] device.py │   ├── [ 5] __init__.py │   ├── [ 392] logger.py │   ├── [4.9K] mtksu.py │   └── [ 758] switch.py ├── [ 35K] LICENSE ├── [ 896] mtk-su.py ├── [2.1K] README.md └── [ 15] requirements.txt 6 directories, 26 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →