Here an
one-click application to install Superuser and su binary on phone.
Superuser and su binary include in application work from android 2 to 4.
!! Important !!
Success with
this application void warranty on your device.
-Installation-
Download it
on your device (links are available at the end of this post)
Install it
with a file explorer or directly from your internet browser, if android warn
you about security risk, say OK and check Unknown sources to allow install of
applications outside of Play Store.
-Usage-
Open Framaroot and select one of the following action: Install SuperSU,
Unroot or Execute script (for advanced users)
Possible case once application is launched
A popup
saying "Your device seems not vulnerable to exploit included in
Framaroot", in this case you can uninstall app
You seeing
one or more exploit name, also click on one after you have selected an action
and you will see one of the above messages
-Possible case once exploit is selected-
1."Success ...
Superuser and su binary installed. You have to reboot your device"
2."Failed ...
Exploit work but installation of Superuser and su binary have failed"
3."Half-Success
:-/ ... system partition is read-only, use local.prop trick. Reboot your device
and use adb to see if it run as root", happen when the filesystem in use
on system partition is a read only filesystem (ex: squashfs)
4."Failed ...
Try another exploit if available"
Compatibility for Qualcomm devices (Gandalf exploit only) :
• ASUS Memopad FHD 10 LTE
• Asus Padfone 1/2
• Asus Padfone A66
• Asus Padfone Infinity
• Asus Transformer Pad Infinity TF700KL
• Archos 50 Platinum
• BLU Studio 5.3 S
• BW T18+ (Fortis Evo)
• Cloudfone Thrill 430x
• Disgo 8400g
• DNS S4504/S4503/S4502
• FAEA F1
• Gigabyte GSmart G1315 Skate
• Gigabyte GSmart Rio R1
• Google Nexus 4
• Highscreen Spark/OMEGA Q/Blast/Strike/Boost
• Hisense AD683G
• HTC One S
• Huawei Ascend G330D U8825D
• Huawei Ascend G526
• Huawei Honor Pro (U8950-1)
• Huawei Premia 4g
• Huawei U8815/U8816 Ascend G300/G301
• Huawei U8825D Ascend G330D
• Huawei Vitria Y301-A2
• Huawei Y215
• K-TOUCH TITAN S100
• Karbonn Titanium S5
• Kyocera Hydro Edge
• Kyocera Hydro Xtrm
• Kyocera Torque
• Lenovo A600e
• Lenovo A706
• Lenovo S870E
• LF-LTE3 (F260S)
• LG Nitro HD
• LG L1 II
• LG L7 II P700/P710/P714/P715/P870
• LG Lucid 2 (VS870)
• LG Optimus Dynamic 2
• LG Optimus F5 (P875)
• LG Optimus F7
• LG Optimus G E970/E975
• LG Optimus L3 II E425
• LG Optimus L5 E610/612/615
• LG Optimus L7 II P710/P713/ P714/P715
• LG Optimus L7 P700/Р705
• LG Optimus LTE 2
• MEDION LIFE P4013
• Micromax A111 Canvas Doodle
• Motorola Defy Mini XT321
• Oppo Find 5
• Orange Nivo
• Orange Yumo
• Orange Zali
• Pantech Discover
• Pantech Flex
• Pantech IM-A840S Vega S5
• Pantech Sky S5 A840S
• Pentagram Combo
• Phicomm i370w / i600 / i800
• Samsung Galaxy Core i8260
• Samsung Galaxy Express GT-I8730
• Samsung Galaxy Win I8552
• Sharp Aquos Phone SH930W
• Smartfren Andromax U
• Smartfren Andromax i2
• Sony Xperia E C1505/Dual C1605
• Sony Xperia L C210X
• teXet TM-3204R
• teXet TM-4677
• Xiaomi Mi-2S
• Yarvik Ingenia Compact SMP35-200
• ZTE T83 (Telstra Dave)
• ZTE V880G/ZTE V955
• ZTE V9815 Grand Memo N5
• ZTE Warp Sequent
Compatibility for MTK devices (Boromir, Faramir and Barahir exploits only) :