With the LG Revolution being made available yesterday at Verizon for $249.99 on two-year contract, developers at RootzWiki have already gotten their hands on it and started tearing it apart. One of the first goals was to obtain superuser access and that goal was quickly achieved.

Surprisingly, LG was lax in their security and left an old, well known vulnerability in the system. The “rageagainstthecage” exploit was developed by Sebastian Krahmer who has more recently developed a similar exploit to obtain root on Gingerbread. The newer exploit was not required for LG Revolution, as the Froyo build used on the device remains vulnerable to the older exploit. The steps are pretty standard for manually rooting, involving using the ADB program included with the Android SDK to push several files to the device, execute them, and install programs to the /system partition to make the root permanent.

A warning is included with the post, stating that there is no recovery available for this device, so there is not yet a way to easily revert the root exploit at this time. Manually reverting should be possible however, and reversing the provided steps (erasing su, rageagainstthecage, and SuperUser) should be sufficient to return to “stock” un-rooted status.

Source: RootzWiki

You May Also Like
HONOR launches ViewPad 6, Router 3, MagicWatch 2 Artist Edition and more
At its Smart Life products launch, HONOR has unveiled three new products.…
The design of the Samsung Galaxy Note 20 has been revealed
It seems that the new Samsung Galaxy Note 20 will come with a centered punch-hole selfie camera after all
Slack’s major redesign goes live on Android and iOS
Just be a little patient though, as the rollout of Slack app’s redesigned version will be conducted over the next few weeks.