You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -11,63 +11,189 @@ If you want the full details of how the exploit works, [skip ahead to our writeu
11
11
12
12
# Is my TV vulnerable?
13
13
14
-
At the time of writing (2021-05-15), all webOS versions between 3.4 and 6.0 we
15
-
tested (TVs released between mid-2017 and early-2021) are supported by this exploit
16
-
chain. Note: this versioning refers to the "webOS TV Version" field in the settings menu, *not*
17
-
the "Software Version" field.
14
+
At the time of writing the original exploit (RootMyTV v1 - 2021-05-15), all
15
+
webOS versions between 3.4 and 6.0 we tested (TVs released between mid-2017 and
16
+
early-2021) are supported by this exploit chain. Around June-July 2021 LG
17
+
started rolling out updates which added some minor mitigations that broke our
18
+
original exploit chain.
18
19
19
-
If you want to protect your TV against remote exploitation, please see the
20
-
[relevant section](#mitigation-note) of our writeup and/or await an update from LG.
20
+
**At the time of writing (RootMyTV v2 - 2022-01-05)**, all webOS versions
21
+
between 4.x and 6.2+ we tested (TVs released between early-2018 and late-2021)
22
+
are supported by the new exploit chain.
23
+
24
+
Some versions between 3.4 and 3.9 may be supported by RootMyTV v2, but your
25
+
mileage may vary.
26
+
27
+
Note: this versioning refers to the "webOS TV Version" field in the settings menu, *not* the "Software Version" field.
28
+
29
+
*If you want to protect your TV against remote exploitation, please see the
30
+
[relevant section](#mitigation-note) of our writeup and/or await an update from LG.*
21
31
22
32
# Usage Instructions
23
33
24
34
**Step Zero (disclaimer):** Be aware of the risks. Rooting your TV is (unfortunately) not supported by
25
35
LG, and although we've done our best to minimise the risk of damage,
26
36
we cannot make any guarantees. This may void your warranty.
27
37
28
-
1. Make sure the "LG Connect Apps" feature is enabled. It seems to be enabled by default on
29
-
webOS 4.0+. For older models, follow [LG's instructions](https://www.lg.com/in/support/help-library/lg-webos-tv-how-to-use-lg-connect-apps-CT20150005-1437127057046).
30
-
2. (Optional but recommended) If you have LG's Developer Mode app installed, uninstall it. You won't be able to use it after running the exploit, and its functionality is replaced by the Homebrew Channel.
38
+
1. (Pre-webOS 4.0) Make sure "Settings → Network → LG Connect Apps" feature is enabled.
39
+
2. Developer Mode app **must be uninstalled before rooting**. Having this
40
+
application installed will interfere with RootMyTV v2 exploit, and its full
41
+
functionality is replaced by Homebrew Channel built-in SSH server.
31
42
3. Open the TV's web browser app and navigate to [https://rootmy.tv](https://rootmy.tv)
32
43
4. "Slide to root" using a Magic Remote or press button "5" on your remote.
33
44
5. Accept the security prompt.
34
45
6. The exploit will proceed automatically. The TV will reboot itself once
35
46
during this process, and optionally a second time to finalize the installation
36
47
of the Homebrew Channel. On-screen notifications will indicate the exploit's
37
-
progress. Occasionally, the TV may turn off instead of rebooting - if this happens, just turn the TV back on again.
48
+
progress. On webOS 6.x **Home Screen needs to be opened** for
49
+
notifications/prompts to show up.
38
50
39
-
Your TV should now have Homebrew Channel app installed, and an
40
-
unauthenticated(!) root telnet service exposed.
51
+
Your TV should now have Homebrew Channel app installed.
52
+
53
+
By default system updates and remote root access are disabled on install. If
54
+
you want to change these settings go to Homebrew Channel → Settings. Options
55
+
there are applied after a reboot.
41
56
42
57
For exploiting broken TVs, check out the information [here](./docs/HEADLESS.md).
43
58
59
+
## Why rooting
60
+
61
+
* Unlimited "Developer Mode" access
62
+
63
+
* While LG allows willing Homebrew developers/users to install unofficial
64
+
applications onto their TVs, official method requires manual renewal of
65
+
"developer mode session", which expires after 50 hours of inactivity.
66
+
* Some of the [amazing homebrew](https://repo.webosbrew.org) that has been
67
+
built/ported onto webOS would likely never be accepted onto LG's official
68
+
Content Store.
69
+
70
+
* Lower level user/application access
71
+
72
+
* This allows willing developers to research webOS system internals, which
73
+
will result in creation of amazing projects, like
74
+
[PicCap](https://github.com/TBSniller/piccap) (high performance video
75
+
capture used for DIY immersive ambient lighting setups), or access to some
76
+
interesting features like customization of system UI, remote adjustment of
77
+
certain TV configuration options, and others.
78
+
79
+
## FAQ
80
+
81
+
### Is it safe?
82
+
83
+
While we cannot take any responsibility for Your actions, we have not
84
+
encountered any bricks due to rooting. If you only use trusted software from
85
+
[official Homebrew Channel repository](https://repo.webosbrew.org), then you
86
+
should be safe.
87
+
88
+
### Will this void my warranty?
89
+
90
+
**This is not a legal advice.** At least in the EU, [rooting and other software
91
+
modifications are generally deemed to be legal](https://piana.eu/root/) and
0 commit comments