For Android enthusiasts, root access is a mandatory requirement that should be owned by an Android device they have, since they can get the most out of their devices when it’s rooted, and some folks even think that their phone isn’t worth without superuser privileges. Gaining root access itself is a challenge, considering that the developers need to find security bugs in the device, once they found it, the bugs will be used to achieve root privileges.
For Galaxy S4 users, a Saferoot exploit is well known, it’s designed by k1mu – a talented developer from xda. Initially, the Saferoot built specifically for the Verizon Samsung Galaxy S4 (SCH-I545) that updated to Android 4.3 Jelly Bean with software version I545VRUAMJ7. But unexpectedly, this exploit not only work for VZW variant of S4, but also working for other variants, including: AT&T, Sprint, even the international variants of S4.
Not only that, the Saferoot was also able to work for almost all of Samsung’s devices running the latest version of the Android 4.3 update, for example the Galaxy S3, Galaxy Note 2, Galaxy S4 mini, even it is reportedly working with DROID RAZR HD / MAXX HD and DROID RAZR M.
The Saferoot doesn’t has Graphical User Interface (GUI), it is simply a batch file (*. bat) that runs on the Windows Command Prompt (CMD). To run it we only need to extract the package (saferoot.zip) then execute the bat file by double-clicking it.
The prerequisites are standard, we just need a Windows based computer with USB devices drivers installed, and a stock OEM USB cable. Also make sure you enable USB Debugging options in Developers options. You can download the Saferoot exploit from k1mu official thread on xda-developers.