Following the recent OTA update sent out by HTC, many phones were getting bricked along with other problems, but enough of that. Inside the HTC update was security patches that patched the previous vulnerability in which root was originally attained. Their was a bounty in the XDA Forums for the person who acheived this and I guess they are paying up at the moment as the bounty now says:
1. Your root method must be able to root a stock EVO with v1.47.651.1. Full root and NAND rw required. – DONE
2. This method must be verified by at least 5 other forum users that are not new. – DONE
3. Once these requirements are met, I will pay you via Paypal. – PENDING
So, congratulations anonymous user, and many thanks!
If you know what your are doing and you follow the instructions, then you should have no issues following this method. If you have no idea what “root” is, then you might want to read up on it.
Here’s the method below, if you’re interested.
“Make sure you have adb ready to go and know how to get into adb shell. You must use the EVO browser to perform these steps. If these steps don’t work, use recovery to wipe your phone and start fresh (you will lose all of your data on the phone)
1. Unzip the files into a directory somewhere on your computer
2. Put the files into the root of your sdcard (mount the EVO as a disk drive)
3. Unmount your phone
4. Run “adb shell” and start part1 on your phone:
Code:
sh /sdcard/part1
5. If the script says to power down, hold your power button and turn off your phone, then turn it back on.
6. When it starts up it will ask you to open the EVO browser. open your EVO browser to http://bit.ly/ad0pRn
7. When it asks you to, refresh the EVO browser on the same page
8. Reboot your phone with “adb reboot”
9. Run adb shell as soon as you can (when the HTC logo is still showing). You need to be fast. If you get “error: device not found”, try again.
Code:
adb shell /data/local/part2
10. It should print after part2 finished:
Code:
crw-rw-rw- root root 90, 2 2010-07-05 19:37 mtd1
11. When your phone finished booting, flash toastcfh’s mtd-eng.img to misc:
Code:
cat /sdcard/flash_image > /data/local/flash_image chmod 755 /data/local/flash_image /data/local/flash_image misc /sdcard/mtd-eng.img
12. Now flash the Engineering SPL with toastcfh’s post:Â http://forum.xda-developers.com/showthread.php?t=701835“
Source: XDA-Developer Forum
Leave your comments below.