Since the early versions of Android, Android root exploits started to come up for every subsequent version and different device manufacturers of Android. Android rooting simply means gaining privileged access to a device which is not granted by the device manufacturer to the user by default. These root exploits exploit various vulnerabilities present in the Android system. The following is a list of some of them, with a brief idea of which vulnerability the exploit is based on:
Exploid: This is based on the CVE-2009-1185 vulnerability in
udev
, a component of Android responsible for USB connections, which verifies whether a Netlink message (a kind of message responsible for connecting the Linux kernel to the user) has originated from the original source or is a forged one crafted by an attacker. So, an attacker could simply send audev
message from the user space itself and elevate the privileges.Gingerbreak: This is another exploit based on a vulnerability present...