[ROOT] H "Network" root (FW<=Oct.2015, no T-GFS)

Here are software that related with Samsung H series TVs.
Please don't create any new topic here unless you have software to post/release.

adonis
SamyGO Project Donor
Posts: 49
Joined: Tue Dec 19, 2017 8:59 pm

Re: [ROOT] H "Network" root (FW<=Oct.2015, no T-GFS)

Post by adonis »

FYI: I just repeated the rooting process, and everything works again ;-)
astrakid
SamyGO Project Donor
Posts: 84
Joined: Mon Sep 14, 2015 3:19 pm

Re: [ROOT] H "Network" root (FW<=Oct.2015, no T-GFS)

Post by astrakid »

It would be enough to simply copy the content to another stick. Since I was losing two sticks already I have always a spare part with the copied content available.
cerny200
Posts: 1
Joined: Mon Aug 06, 2018 8:03 pm

Re: [ROOT] H "Network" root (FW<=Oct.2015, no T-GFS)

Post by cerny200 »

It is possible on my Samsung UE48H6700 fw T-MST14DEUC-2880.2 to downgrade to fw 0000 and then update to 2130.
astrakid
SamyGO Project Donor
Posts: 84
Joined: Mon Sep 14, 2015 3:19 pm

Re: [ROOT] H "Network" root (FW<=Oct.2015, no T-GFS)

Post by astrakid »

yes. should work. didn't test it from that version, but it worked for something like 27xx.x for me.
sectroyer
Official SamyGO Developer
Posts: 6305
Joined: Wed May 04, 2011 5:10 pm

Re: [ROOT] H "Network" root (FW<=Oct.2015, no T-GFS)

Post by sectroyer »

Just prepare new usb
I do NOT support "latest fw" at ALL. If you have one you should block updates on router and wait for it to STOP being "latest":)
If you want me to help you please paste FULL log(s) to "spoiler"/"code" bbcodes or provide link(s) to pasted file(s) on https://pastebin.com Otherwise "NO HELP"!!!
If you want root DISABLE internet access to your device!!!!
DO NOT EVER INSTALL FIRMWARE UPGRADE !!!!
gfx18
Posts: 2
Joined: Fri Aug 17, 2018 3:07 pm

Re: [ROOT] H "Network" root (FW<=Oct.2015, no T-GFS)

Post by gfx18 »

Hi,
Just registered, great work for samsung tv.
I got a Samsung Model UA55H6400. I remember I stopped updates in the menu, I guess in 2016. Currently I got following firmware,
Software Version T-MST14UABC-2180.4, BT -S/G
Sub Micom version : T-MST14DEUS-1008

I remember I searched this forum for hack for a h series samsung tv, but did not find any. But got the info to stop tv from firmware updating. It did not update firmware after 2180

Is it ok to try rooting on this device, pls. let me know.
gfx18
Posts: 2
Joined: Fri Aug 17, 2018 3:07 pm

Re: [ROOT] H "Network" root (FW<=Oct.2015, no T-GFS)

Post by gfx18 »

I hv got the latest openwrt firmware with ipv4 and ipv6 lock firewall. Unless there is a connection from inside, it will not allow any connection from outside other then upnp. No firmware update will happen unless me or someone from home initiate from the tv and no one will do that and no prompt possible from outside.
nav1303
SamyGO Project Donor
Posts: 3
Joined: Fri Dec 11, 2015 12:23 pm

Re: [App] H "Network" root (FW<=Oct.2015, no T-GFS)

Post by nav1303 »

qtuzoff wrote: Fri Jul 21, 2017 6:39 pm Hello. I have problem with rooting.
My TV is H6410 T-MST. FW = 2781.
Root works only once. After reboot tv, it not works.
Logs:
SpoilerShow
vermagic.txt:

Code: Select all

0135, product SMP preempt mod_unload ARMv7 
insmod_qca.sh:

Code: Select all

echo " insmod_qca.sh begin"
insmod /mtd_cmmlib/WIFI_LIB/QCA/cfg80211.ko
insmod /mtd_cmmlib/WIFI_LIB/QCA/ath6kl_usb.ko ath6kl_p2p=0x19 debug_quirks=0x200 reg_domain=0x16
echo " insmod_qca.sh end"
network_type_info.txt:

Code: Select all

CurrentType=1
SamyGO_OK.txt:

Code: Select all

OK.
wifi_vendor.txt:

Code: Select all

2
sam.log

Code: Select all

checking /dtv/usb/sda1
checking /dtv/usb/sdb
samyGOso v1.2.5 (c) bugficks 2013-2014, sectroyer 2014-2015
Injecting '/mnt/opt/privateer/usr/bin/oscam//libOscamH_build128.so' resident: '1'
Succeeded. 
Rooting process:
SpoilerShow
Image
How don't reset root?
Hello. I have the same problem with the same hardware with rooting.

TV is H6410 T-MST. FW = 2781.

Root works only once. After run InstallSamyGO-H and first reboot.

After second and other reboots - root isn't work. No ping on 3123,21 ports.

Tv needs new run InstallSamyGO-H and reboot, then is ok.

The logs and screens are the same like qtuzoff. Except sam.log.
SpoilerShow
insmod_qca.sh:

Code: Select all

echo " insmod_qca.sh begin"
insmod /mtd_cmmlib/WIFI_LIB/QCA/cfg80211.ko
insmod /mtd_cmmlib/WIFI_LIB/QCA/ath6kl_usb.ko ath6kl_p2p=0x19 debug_quirks=0x200 reg_domain=[b][color=#FF0000]0x16[/color][/b]
echo " insmod_qca.sh end"
sam.log:

Code: Select all

+ /bin/sleep 30
+ /dtv/bin/ls
Terminated
+ [ 143 -eq 143 ]
+ echo SFD detected. Insmoding...
SFD detected. Insmoding...
+ /bin/cp /dtv/usb/sda1/SamyGO/antysfd.ko /tmp/
+ /bin/cp /dtv/usb/sda1/SamyGO/ntkfree /tmp/
+ /sbin/insmod /tmp/antysfd.ko
+ [ 0 -ne 0 ]
+ /bin/dmesg
+ /bin/busybox grep anty
 [antysfd] loaded
 [antysfd] security_ops: 0xc0373130
 [antysfd] sfd_mmap_file_hook: 0xbe46f884
 [antysfd] close: 0xc00b83f4
 [antysfd] open: 0xbe46ecb8
 [antysfd] Starting sfd_uep_check_elf_file search at: 0xbe46ecb8
 [antysfd] found DMB SY at: 0xbe46f7d8
 [antysfd] branch sfd_uep_check_elf_file: 0xbe46f7f0
 [antysfd] sfd_uep_check_elf_file: 0xbe465384
 [antysfd] Patching sfd.ko successful!!!
antysfd mod ld
+ chmod +x /tmp/ntkfree
+ mknod /dtv/ntkaxis c 140 0
+ /tmp/ntkfree
open failed
+ cp /dtv/usb/sda1/SamyGO/samyGOso /tmp/
cp: can't stat '/dtv/usb/sda1/SamyGO/samyGOso': No such file or directory
+ cp /dtv/usb/sda1/SamyGO/libNetSwitch.so /tmp/
cp: can't stat '/dtv/usb/sda1/SamyGO/libNetSwitch.so': No such file or directory
+ chmod +x /tmp/samyGOso
chmod: /tmp/samyGOso: No such file or directory
+ /tmp/samyGOso -d -A -r -l /tmp/libNetSwitch.so WIRED
/dtv/usb/sda1/SamyGO/lan.sh: line 5: /tmp/samyGOso: not found
+ echo checking /dtv/usb/sda1
checking /dtv/usb/sda1
+ /bin/sleep 1
+ [ -e /dtv/usb/sda1/STOP_SAMYGO ]
+ cd /tmp
+ mkdir /tmp/bin
+ echo OK
+ [ -e /dtv/qcm_samygo ]
+ touch /dtv/qcm_samygo
+ cp /dtv/usb/sda1/SamyGO/samygo_telnetd /dtv/
+ chmod +x /dtv/samygo_telnetd
+ cp /dtv/usb/sda1/SamyGO/busybox+  /tmp/bin//dtv/samygo_telnetd
 33
Starting simple telnet server
Socket created
bind done
Waiting for incoming connections...
+ chmod +x /tmp/bin/busybox
+ /tmp/bin/busybox --install -s /tmp/bin
+ sync
+ export PATH=/tmp/bin:/dtv/bin:/usr/sbin:/usr/bin:/bin:/sbin:/etc/Scripts:/util
+ export LD_LIBRARY_PATH=/tmp/bin:/dtv/bin:/lib
+ sync
+ sync
+ /tmp/bin/busybox tcpsvd -vE 0.0.0.0 21 /tmp/bin/busybox ftpd -w /
tcpsvd: listening on 0.0.0.0:21, starting
+ ln -s /dev/loop3 /tmp/loopnone
+ sync
+ [ -e /dtv/usb/sda1/SamyGO/newvdfs.img ]
+ /tmp/bin/busybox losetup /tmp/loopnone /dtv/usb/sda1/SamyGO/samyext4.img
+ /tmp/bin/busybox mount -t ext4 -o sync,exec /tmp/loopnone /mnt
+ /tmp/bin/busybox --install -s /mnt/bin
tcpsvd: start 3510 192.168.0.186:21-192.168.0.168:58930
tcpsvd: status 1/30
tcpsvd: start 3511 192.168.0.186:21-192.168.0.168:58932
tcpsvd: status 2/30
tcpsvd: end 3510 exit 0
tcpsvd: status 1/30
tcpsvd: end 3511 exit 0
tcpsvd: status 0/30
tcpsvd: start 3512 192.168.0.186:21-192.168.0.168:58938
tcpsvd: status 1/30
tcpsvd: end 3512 exit 0
tcpsvd: status 0/30
+ sync
+ rm /mnt/sam.log
rm: can't remove '/mnt/sam.log': No such file or directory
+ ls -la /mnt/bin /mnt/doc /mnt/etc /mnt/firmware /mnt/lib /mnt/lost+found /mnt/mc /mnt/opt /mnt/rcSGO /mnt/sbin /mnt/src /mnt/usr /mnt/var
tcpsvd: start 3517 192.168.0.186:21-192.168.0.168:58939
tcpsvd: status 1/30
tcpsvd: end 3517 exit 0
tcpsvd: status 0/30
tcpsvd: start 3518 192.168.0.186:21-192.168.0.168:58942
tcpsvd: status 1/30
tcpsvd: end 3518 exit 0
tcpsvd: status 0/30
tcpsvd: start 3519 192.168.0.186:21-192.168.0.168:58946
tcpsvd: status 1/30
tcpsvd: end 3519 exit 0
tcpsvd: status 0/30
+ echo ===========================
+ echo Starting rcSGO from run1.sh
+ echo ===========================
+ /mnt/bin/busybox2 sh -x /mnt/rcSGO /mnt
tcpsvd: start 3530 192.168.0.186:21-192.168.0.168:58947
tcpsvd: status 1/30
tcpsvd: end 3530 exit 0
tcpsvd: status 0/30
tcpsvd: start 3544 192.168.0.186:21-192.168.0.168:58953
tcpsvd: status 1/30
tcpsvd: end 3544 exit 0
tcpsvd: status 0/30
tcpsvd: start 3545 192.168.0.186:21-192.168.0.168:58957
tcpsvd: status 1/30
tcpsvd: end 3545 exit 0
tcpsvd: status 0/30
tcpsvd: start 3546 192.168.0.186:21-192.168.0.168:58958
tcpsvd: status 1/30
tcpsvd: end 3546 exit 0
tcpsvd: status 0/30
tcpsvd: start 3547 192.168.0.186:21-192.168.0.168:58962
tcpsvd: status 1/30
tcpsvd: end 3547 exit 0
tcpsvd: status 0/30
tcpsvd: start 3549 192.168.0.186:21-192.168.0.168:58965
tcpsvd: status 1/30
tcpsvd: end 3549 exit 0
tcpsvd: status 0/30
tcpsvd: start 3555 192.168.0.186:21-192.168.0.168:58968
tcpsvd: status 1/30
tcpsvd: end 3555 exit 0
tcpsvd: status 0/30
tcpsvd: start 3558 192.168.0.186:21-192.168.0.168:58974
tcpsvd: status 1/30
tcpsvd: end 3558 exit 0
tcpsvd: status 0/30
tcpsvd: start 3559 192.168.0.186:21-192.168.0.168:58977
tcpsvd: status 1/30
tcpsvd: start 3562 192.168.0.186:21-192.168.0.168:58979
tcpsvd: status 2/30
tcpsvd: end 3562 exit 0
tcpsvd: status 1/30
tcpsvd: start 3563 192.168.0.186:21-192.168.0.168:58982
tcpsvd: status 2/30
tcpsvd: end 3563 exit 0
tcpsvd: status 1/30
tcpsvd: start 3565 192.168.0.186:21-192.168.0.168:58986
tcpsvd: status 2/30
tcpsvd: end 3565 exit 0
tcpsvd: status 1/30
tcpsvd: start 3574 192.168.0.186:21-192.168.0.168:58987
tcpsvd: status 2/30
tcpsvd: end 3574 exit 0
tcpsvd: status 1/30
tcpsvd: start 3575 192.168.0.186:21-192.168.0.168:58991
tcpsvd: status 2/30
tcpsvd: end 3575 exit 0
tcpsvd: status 1/30
tcpsvd: start 3577 192.168.0.186:21-192.168.0.168:58996
tcpsvd: status 2/30
tcpsvd: end 3577 exit 0
tcpsvd: status 1/30
tcpsvd: start 3580 192.168.0.186:21-192.168.0.168:58998
tcpsvd: status 2/30
tcpsvd: end 3580 exit 0
tcpsvd: status 1/30
tcpsvd: start 3585 192.168.0.186:21-192.168.0.168:59003
tcpsvd: status 2/30
tcpsvd: end 3585 exit 0
tcpsvd: status 1/30
tcpsvd: start 3586 192.168.0.186:21-192.168.0.168:59006
tcpsvd: status 2/30
tcpsvd: end 3586 exit 0
tcpsvd: status 1/30
tcpsvd: start 3590 192.168.0.186:21-192.168.0.168:59008
tcpsvd: status 2/30
tcpsvd: end 3590 exit 0
tcpsvd: status 1/30
tcpsvd: start 3592 192.168.0.186:21-192.168.0.168:59013
tcpsvd: status 2/30
tcpsvd: end 3592 exit 0
tcpsvd: status 1/30
tcpsvd: start 3594 192.168.0.186:21-192.168.0.168:59017
tcpsvd: status 2/30
tcpsvd: end 3594 exit 0
tcpsvd: status 1/30
tcpsvd: start 3597 192.168.0.186:21-192.168.0.168:59019
tcpsvd: status 2/30
tcpsvd: end 3597 exit 0
tcpsvd: status 1/30
tcpsvd: start 3598 192.168.0.186:21-192.168.0.168:59025
tcpsvd: status 2/30
tcpsvd: end 3598 exit 0
tcpsvd: status 1/30
tcpsvd: start 3601 192.168.0.186:21-192.168.0.168:59026
tcpsvd: status 2/30
tcpsvd: end 3601 exit 0
tcpsvd: status 1/30
tcpsvd: start 3602 192.168.0.186:21-192.168.0.168:59032
tcpsvd: status 2/30
tcpsvd: end 3602 exit 0
tcpsvd: status 1/30
tcpsvd: start 3603 192.168.0.186:21-192.168.0.168:59036
tcpsvd: status 2/30
tcpsvd: end 3603 exit 0
tcpsvd: status 1/30
tcpsvd: start 3604 192.168.0.186:21-192.168.0.168:59037
tcpsvd: status 2/30
tcpsvd: end 3604 exit 0
tcpsvd: status 1/30
tcpsvd: start 3606 192.168.0.186:21-192.168.0.168:59041
tcpsvd: status 2/30
tcpsvd: end 3606 exit 0
tcpsvd: status 1/30
tcpsvd: start 3607 192.168.0.186:21-192.168.0.168:59044
tcpsvd: status 2/30
tcpsvd: end 3607 exit 0
tcpsvd: status 1/30
tcpsvd: start 3613 192.168.0.186:21-192.168.0.168:59046
tcpsvd: status 2/30
tcpsvd: end 3613 exit 0
tcpsvd: status 1/30
tcpsvd: start 3614 192.168.0.186:21-192.168.0.168:59050
tcpsvd: status 2/30
tcpsvd: end 3614 exit 0
tcpsvd: status 1/30
tcpsvd: start 3615 192.168.0.186:21-192.168.0.168:59051
tcpsvd: status 2/30
tcpsvd: start 3616 192.168.0.186:21-192.168.0.168:59052
tcpsvd: status 3/30
tcpsvd: start 3617 192.168.0.186:21-192.168.0.168:59057
tcpsvd: status 4/30
tcpsvd: end 3617 exit 0
tcpsvd: status 3/30
tcpsvd: start 3618 192.168.0.186:21-192.168.0.168:59058
tcpsvd: status 4/30
tcpsvd: end 3618 exit 0
tcpsvd: status 3/30
tcpsvd: start 3630 192.168.0.186:21-192.168.0.168:59063
tcpsvd: status 4/30
tcpsvd: end 3630 exit 0
tcpsvd: status 3/30
tcpsvd: start 3631 192.168.0.186:21-192.168.0.168:59066
tcpsvd: status 4/30
tcpsvd: end 3631 exit 0
tcpsvd: status 3/30
tcpsvd: start 3632 192.168.0.186:21-192.168.0.168:59070
tcpsvd: status 4/30
tcpsvd: end 3632 exit 0
tcpsvd: status 3/30
tcpsvd: start 3633 192.168.0.186:21-192.168.0.168:59074
tcpsvd: status 4/30
tcpsvd: end 3633 exit 0
tcpsvd: status 3/30
tcpsvd: start 3662 192.168.0.186:21-192.168.0.168:59075
tcpsvd: status 4/30
tcpsvd: end 3662 exit 0
tcpsvd: status 3/30
tcpsvd: start 3686 192.168.0.186:21-192.168.0.168:59079
tcpsvd: status 4/30
tcpsvd: end 3686 exit 0
tcpsvd: status 3/30
tcpsvd: start 3726 192.168.0.186:21-192.168.0.168:59083
tcpsvd: status 4/30
tcpsvd: end 3726 exit 0
tcpsvd: status 3/30
tcpsvd: start 3741 192.168.0.186:21-192.168.0.168:59087
tcpsvd: status 4/30
tcpsvd: end 3741 exit 0
tcpsvd: status 3/30
tcpsvd: start 3742 192.168.0.186:21-192.168.0.168:59092
tcpsvd: status 4/30
tcpsvd: end 3742 exit 0
tcpsvd: status 3/30
tcpsvd: start 3745 192.168.0.186:21-192.168.0.168:59095
tcpsvd: status 4/30
tcpsvd: end 3745 exit 0
tcpsvd: status 3/30
tcpsvd: start 3747 192.168.0.186:21-192.168.0.168:59097
tcpsvd: status 4/30
tcpsvd: end 3747 exit 0
tcpsvd: status 3/30
tcpsvd: start 3797 192.168.0.186:21-192.168.0.168:59102
tcpsvd: status 4/30
tcpsvd: end 3797 exit 0
tcpsvd: status 3/30
tcpsvd: start 3802 192.168.0.186:21-192.168.0.168:59106
tcpsvd: status 4/30
tcpsvd: end 3802 exit 0
tcpsvd: status 3/30
tcpsvd: start 3804 192.168.0.186:21-192.168.0.168:59111
tcpsvd: status 4/30
tcpsvd: end 3804 exit 0
tcpsvd: status 3/30
tcpsvd: start 3806 192.168.0.186:21-192.168.0.168:59115
tcpsvd: status 4/30
tcpsvd: end 3806 exit 0
tcpsvd: status 3/30
tcpsvd: start 3808 192.168.0.186:21-192.168.0.168:59116
tcpsvd: status 4/30
tcpsvd: end 3808 exit 0
tcpsvd: status 3/30
tcpsvd: start 3829 192.168.0.186:21-192.168.0.168:59120
tcpsvd: status 4/30
tcpsvd: end 3829 exit 0
tcpsvd: status 3/30
tcpsvd: start 3830 192.168.0.186:21-192.168.0.168:59126
tcpsvd: status 4/30
tcpsvd: end 3830 exit 0
tcpsvd: status 3/30
tcpsvd: start 3831 192.168.0.186:21-192.168.0.168:59128
tcpsvd: status 4/30
tcpsvd: end 3831 exit 0
tcpsvd: status 3/30
tcpsvd: start 3832 192.168.0.186:21-192.168.0.168:59132
tcpsvd: status 4/30
tcpsvd: end 3832 exit 0
tcpsvd: status 3/30
tcpsvd: start 3833 192.168.0.186:21-192.168.0.168:59135
tcpsvd: status 4/30
tcpsvd: end 3833 exit 0
tcpsvd: status 3/30
tcpsvd: start 3834 192.168.0.186:21-192.168.0.168:59136
tcpsvd: status 4/30
tcpsvd: end 3834 exit 0
tcpsvd: status 3/30
tcpsvd: start 3835 192.168.0.186:21-192.168.0.168:59142
tcpsvd: status 4/30
tcpsvd: end 3835 exit 0
tcpsvd: status 3/30
tcpsvd: start 3836 192.168.0.186:21-192.168.0.168:59145
tcpsvd: status 4/30
tcpsvd: end 3836 exit 0
tcpsvd: status 3/30
tcpsvd: start 3841 192.168.0.186:21-192.168.0.168:59147
tcpsvd: status 4/30
tcpsvd: end 3841 exit 0
tcpsvd: status 3/30
tcpsvd: start 3842 192.168.0.186:21-192.168.0.168:59153
tcpsvd: status 4/30
tcpsvd: end 3842 exit 0
tcpsvd: status 3/30
tcpsvd: start 3843 192.168.0.186:21-192.168.0.168:59154
tcpsvd: status 4/30
tcpsvd: end 3843 exit 0
tcpsvd: status 3/30
tcpsvd: start 3844 192.168.0.186:21-192.168.0.168:59157
tcpsvd: status 4/30
tcpsvd: end 3844 exit 0
tcpsvd: status 3/30
tcpsvd: start 3845 192.168.0.186:21-192.168.0.168:59161
tcpsvd: status 4/30
tcpsvd: end 3845 exit 0
tcpsvd: status 3/30
tcpsvd: start 3846 192.168.0.186:21-192.168.0.168:59163
tcpsvd: status 4/30
tcpsvd: end 3846 exit 0
tcpsvd: status 3/30
tcpsvd: start 3847 192.168.0.186:21-192.168.0.168:59168
tcpsvd: status 4/30
tcpsvd: end 3847 exit 0
tcpsvd: status 3/30
tcpsvd: start 3848 192.168.0.186:21-192.168.0.168:59171
tcpsvd: status 4/30
tcpsvd: end 3848 exit 0
tcpsvd: status 3/30
tcpsvd: start 3849 192.168.0.186:21-192.168.0.168:59172
tcpsvd: status 4/30
tcpsvd: end 3849 exit 0
tcpsvd: status 3/30
tcpsvd: start 3850 192.168.0.186:21-192.168.0.168:59176
tcpsvd: status 4/30
tcpsvd: end 3850 exit 0
tcpsvd: status 3/30
tcpsvd: start 3851 192.168.0.186:21-192.168.0.168:59179
tcpsvd: status 4/30
tcpsvd: end 3851 exit 0
tcpsvd: status 3/30
tcpsvd: start 3858 192.168.0.186:21-192.168.0.168:59181
tcpsvd: status 4/30
tcpsvd: end 3858 exit 0
tcpsvd: status 3/30
tcpsvd: start 3866 192.168.0.186:21-192.168.0.168:59187
tcpsvd: status 4/30
tcpsvd: end 3866 exit 0
tcpsvd: status 3/30
tcpsvd: start 3867 192.168.0.186:21-192.168.0.168:59188
tcpsvd: status 4/30
tcpsvd: end 3867 exit 0
tcpsvd: status 3/30
tcpsvd: start 3868 192.168.0.186:21-192.168.0.168:59193
tcpsvd: status 4/30
tcpsvd: end 3868 exit 0
tcpsvd: status 3/30
tcpsvd: start 3869 192.168.0.186:21-192.168.0.168:59197
tcpsvd: status 4/30
tcpsvd: end 3869 exit 0
tcpsvd: status 3/30
tcpsvd: start 3870 192.168.0.186:21-192.168.0.168:59199
tcpsvd: status 4/30
tcpsvd: end 3870 exit 0
tcpsvd: status 3/30
tcpsvd: start 3871 192.168.0.186:21-192.168.0.168:59203
tcpsvd: status 4/30
tcpsvd: end 3871 exit 0
tcpsvd: status 3/30
tcpsvd: end 3616 exit 0
tcpsvd: status 2/30
tcpsvd: end 3615 exit 0
tcpsvd: status 1/30
tcpsvd: end 3559 exit 1
tcpsvd: status 0/30
vermagic.txt:

Code: Select all

0135, product SMP preempt mod_unload ARMv7 
network_type_info.txt:

Code: Select all

CurrentType=1
SamyGO_OK.txt:

Code: Select all

OK
wifi_vendor.txt:

Code: Select all

2
Install screen wrong (can't find actual version). I will try again and do new one.
patch_result_online.jpg
Is there any way I can troubleshoot this issue?

TV connected via WiFi to the router. IP obtains via DHCP.

Added:

Looks like I should use data_0x16.zip instead of data.zip... I will try.

SOLVED
Replacing data.zip with data_0x16.zip in InstallSamyGO-H\data\ folder on USB before first run solve the problem!!!! Great!!! Thanks for guide. It's working. Even without second USB stick.

UE40H6410 T-MST14DEUC-2781.0 successfully rooted.

EDITED:
After 2 days of investigations I had installed FW 2130 & network root.
SpoilerShow
OSCAM successfully started and working unlike FW 2781.
You do not have the required permissions to view the files attached to this post.
TV : UE40H6410 / Firmware : T-MST14DEUC-2781.0 => T-MST14DEUC-2130.0 / Root : "Network" Method
TV : UE40ES6800 / Firmware: T-MST10PDEUC-2006.0 / Root: >2000.2
TV : UE55JU7000 / Firmware : T-HKMDEUC-1411.0 / Root : J ROOT on T-HK* fw up to 1480
TV : UE50JU6400 / Firmware : =>T-HKMDEUC-1412.0 / Root : J ROOT on T-HK* fw up to 1480
FrancYescO
Posts: 28
Joined: Sat Jul 25, 2015 12:34 am

Re: [ROOT] H "Network" root (FW<=Oct.2015, no T-GFS)

Post by FrancYescO »

FrancYescO wrote: Thu Jun 21, 2018 10:01 am Hello, can i use this root method on
UE58H5203
T-NT14MDEUC 1119.2

i find really few infos about this model that have a "J" missing in the firmware name :(

My TV have no build-in wifi, it's working if i attach the wireless dongle? i already tried all method to install skype, but it's never starting so i cannot use the skype method.
UP?
sectroyer
Official SamyGO Developer
Posts: 6305
Joined: Wed May 04, 2011 5:10 pm

Re: [ROOT] H "Network" root (FW<=Oct.2015, no T-GFS)

Post by sectroyer »

Down! No :)
I do NOT support "latest fw" at ALL. If you have one you should block updates on router and wait for it to STOP being "latest":)
If you want me to help you please paste FULL log(s) to "spoiler"/"code" bbcodes or provide link(s) to pasted file(s) on https://pastebin.com Otherwise "NO HELP"!!!
If you want root DISABLE internet access to your device!!!!
DO NOT EVER INSTALL FIRMWARE UPGRADE !!!!

Post Reply

Return to “[H] Software”