Info:
Code:
Application: 1.0.0.14
Model: Autodetect
Request information...
Searching Phone...
Device Found
Reading info...
Manufacturer: Compal
Model: TOUGH
ID: JZO54K
Baseband ver: MAUI.11AMD.W12.22.SP.V30@041, 2013/08/16 15:51
Android ver: 4.1.2
CPU type: armeabi-v7a
Region: GB
Locale: en
Chipset:
HW version: mt6577
CPU: ARMv7
CPU implementer: 0x41
CPU architecture: 7
CPU variant: 0x3
CPU part: 0xc09
Kernel ver: 3.4.0
Done
ROOT:
Code:
Application: 1.0.0.14
Model: Autodetect
Searching Phone...
Device Found
Reading info...
Manufacturer: Compal
Model: TOUGH
ID: JZO54K
Baseband ver: MAUI.11AMD.W12.22.SP.V30@041, 2013/08/16 15:51
Android ver: 4.1.2
CPU type: armeabi-v7a
Region: GB
Locale: en
Chipset:
HW version: mt6577
CPU: ARMv7
CPU implementer: 0x41
CPU architecture: 7
CPU variant: 0x3
CPU part: 0xc09
Kernel ver: 3.4.0
Root status: Off
Rooting...
Method-5: Android 4.x
Checking System...
Pushing Exploit...
1988284 Bytes
Executing Exploit...
Please Wait
Taking Over...
Rooting Device...
Access Granted
Searching Phone...
Device Found
Root status: On
Done
DONE !