Good news! You can now fix the Exynos exploit using ExynosAbuse APK v1.10 app (now updated to v1.40). An XDA member Alephzain had found a kernel level exploit in Exynos 4 powered devices that gave could allow any app to access full physical memory and also get the root access to your device without flashing it. Now the popular developer Chainfire has built ExynosAbuse app that will root Exynos device of yours and will patch the vulnerability so your device becomes safe from potential threats. It will install SuperSU v0.99 on your device and fix the exploit.
Here is some of the stuff you need to know:
- Installing this ExynosAbuse fix will void your warranty.
- Your device will be rooted if it isn’t already.
- When you disable the exploit, it may break the camera app. To reuse the camera, you will need to enable the exploit again.
You get following options in Voodoo Lazy Anti ExynosAbuse:
Exynos Abuse vulnerability status – Checks for the current status of your device and tells if the device is vulnerable.
Enable Exynos vulnerability fix – This will fix the vulnerability but will break the camera app on Galaxy S3 when activated.
Enable vulnerability fix at boot – Will enable the vulnerability fix at boot to keep your device protected from the moment it boots up.
List of Compatible Devices
- Samsung Galaxy S2 GT-I9100
- Samsung Galaxy S3 GT-I9300
- Samsung Galaxy S3 LTE GT-I9305
- Samsung Galaxy Note GT-N7000
- Samsung Galaxy Note 2 GT-N7100
- Samsung Galaxy Note 2 LTE GT-N7105
- Verizon Galaxy Note 2 SCH-I605 both locked and unlocked bootloaders work
- Samsung Galaxy Tab Plus GT-P6210
- Samsung Galaxy Note 10.1 GT-N8000, GT-N8010, GT-N8013, GT-N8020
Download ExynosAbuse APK
Download the latest version from here
2012.12.19 – v1.40
– Added check for updates functionality
– Added “current status” display
– Split into sections for non-rooters and rooters
– Added “One-click secure exploit patch” for those who just want to patch their device and forget about
– Added ability to unroot and clean up the leftovers (optionally leaving the patch code in place)
2012.12.18 – v1.30
– Adjusted many things in the shell code, the app will now properly detect an install SuperSU/Superuser with the wrong permissions as NOT having root
– Added a startup notification telling you your device/firmware is not susceptible to this exploit, if it isn’t
2012.12.17 – v1.20
– Gingerbread-related fixes – note that not all Gingerbread firmwares of affected devices are vulnerable (for example, I know several SGS2 GB firmwares are not exploitable)
– Added some spam (view my apps on Play, follow me on Twitter, that sort of BS)
– Added icon
2012.12.16 – v1.10
– Added ability to disable and re-enable the exploit (which may break camera)
– Added ability to disable exploit at boot (before any Play-installed app runs, other solutions run later which means they are still vulnerable)
– Both above features require being rooted
2012.12.16 – v1.00
– Initial release
We can keep on hoping to have the proper fix for this extremely dangerous Exynos 4 exploit but in the meantime, this workaround will keep you safe of potential threats.
Liked this article? Please share: