x PhoneArena is looking for new authors! To view all available positions, click here.
  • Home
  • News
  • Have no fear, newest Root method for the Verizon Samsung Galaxy S4 is here

Have no fear, newest Root method for the Verizon Samsung Galaxy S4 is here

Have no fear, newest Root method for the Verizon Samsung Galaxy S4 is here
Who is smarter: Samsung, Verizon, or the folks over at XDA Forums?

As you may recall, shortly after the Samsung Galaxy S4 was released by Verizon, XDA members discovered a way to be able to root the phone and have the bootloader unlocked.

But a couple weeks ago, Verizon started to roll out a new software update (VRUAME7) for the Samsung Galaxy S4, but in doing so they also closed the earlier exploit and re-locked the phone.

Since then, members of XDA Forums have been hard at work to see if the device could be rooted after installing the VRUAME7 software update. We are now happy to report there is now a way to root the Galaxy S4 that is running VRUAME7.

Listed below are the steps for rooting the Verizon Samsung Galaxy S4 (VRUAME7).
Please keep in mind this is a ROOT ONLY METHOD, as there is currently no way to unlock the bootloader, which in-turn means you can't install a custom kernel or get Google Wallet to work (unless you forget all this, wipe the phone, and install a Custom ROM).
You also need a microSD memory card that is formatted by your PC as exFAT, not FAT32.


Description: This is a simple guide that will allow you to easily root your Verizon Galaxy S4 device without having to wipe your device or flash a full prerooted factory image. This method works using a root exploit (originally created by user hiikezoe, then ported for ease of use by DooMLoRD) and modifications of this exploit to work on the Verizon Galaxy S4 device (provided by user PWM978). Only change is I have modified the root method to use the latest SuperSU binaries and repackaged with simpler instructions.

Step 1 - Preparation

Quote:
  1. Download and Install Samsung Official USB Drivers - Link
  2. Download and Install Android Terminal Emulator on your device - Link
  3. Download the extract the Root Exploit package on your computer - Link

Step 2 - MicroSD Card Preparation

Quote:
  • Insert a microSD into your device ***Required***
  • Make sure it is formatted as exFAT (not FAT32) ***VERY IMPORTANT***
  • If you have a 64GB microSD card you can use your phone to format it as exFAT by default directly from the Storage settings
  • If you have anything less than 64GB microSD card you may have to use the computer to format it manually as exFAT

    ***If your microSD card is not formatted as exFAT you will see "permission denied" errors when running the exploit***

  • Once formatted, move all files and folders from the Root Exploit package directly onto the root of your microSD card (nowhere else)

Step 3 - Rooting Your Device

Quote:
  • Open the Android Terminal Emulator app on your phone
  • Run the following 3 commands one after another (capital letters are important)
    Code:
    cd /mnt/extSdCard
    ./pwn
    ./script.sh
  • After running the second command you should have seen your $ change to a # meaning you have root access
  • The third command is required to make this root access permanent
  • After all 3 commands are done, close the Terminal app and check if SuperSU has any update in the Play Store
  • Open SuperSU app and let the binary update itself to the latest (if any updates are available)
  • Once complete, just open a root application and verify that is able to access root properly
  • Reboot your device one time and confirm you still have root acess
  • If all is well you should now be fully rooted on the stock VRUAME7 build of your phone
  • ***Make sure to avoid all future OTA's to prevent this root method from being patched!***



YouTube video by DroidModd3rX



source: XDA and YouTube

7 Comments
  • Options
    Close




posted on 03 Aug 2013, 05:31

1. Daftama (Posts: 560; Member since: 03 Nov 2012)


Anyone got a video step by step for dummies

posted on 04 Aug 2013, 14:26

3. monomilkman (Posts: 25; Member since: 11 Feb 2013)


forum.xda-developers.com/showthread.php?t=2380325

I did this a few days ago and can confirm it works

posted on 03 Aug 2013, 14:52

2. networkdood (Posts: 6247; Member since: 31 Mar 2010)


See, I told everyone that issue would get resolved.

posted on 19 Feb 2014, 23:33

7. buetow79 (Posts: 1; Member since: 19 Feb 2014)


at the second command, I am getting /system/bin/sh: ./pwn: can't execute: permission denied and then a security notice comes up saying; Terminal Emulator attempted to access a secure area on your phone without authorization. this attempt has been blocked. make sure your phone is protected by updating the security policy to the latest version from samsung. what if anything did or can i do to stop this? it will not allow me to move on to step three

posted on 31 Aug 2013, 19:24

4. mjwford1 (Posts: 1; Member since: 31 Aug 2013)


Seems to be working for me but once I go into CWM recovery and try to install AOKP, I get a 'can't read whole signature error' and it reboots back to stock. What am I missing? I rooted my Galaxy Nexus and put a hundred ROM's on it. Never had an issue like this.

posted on 07 Jan 2014, 20:46

5. bohanan (Posts: 2; Member since: 07 Jan 2014)


When I format my sd card there is no option to format in exfat. I have a 64gb card and I tried to format it from the phone as well as my computer, any help would be very much appreciated!

posted on 07 Jan 2014, 22:03

6. bohanan (Posts: 2; Member since: 07 Jan 2014)


Formatted the card in exfat but still gives me the denied access.

Want to comment? Please login or register.

Latest stories