How to Root Galaxy S4 (AT&T) SGH-I337 on Android 4.2.2 UCUAMF3 Jelly Bean Firmware

An official Android 4.2.2 Jelly Bean Over-The-Air (OTA) update with build number I337UCUAMF3 has been released for the AT&T subscribers of the Samsung Galaxy S4 (SGH-I337).

Galaxy S4 (AT&T) SGH-I337 users who have already updated their devices with Android 4.2.2 UCUAMF3 Jelly Bean, may root their devices using the tutorial below.

This tutorial uses the Root Exploit package created by Recognized XDA-Developers, DooMLoRD, which later adapted by Jortex to make it work on Galaxy S4 (AT&T) SGH-I337. The Root Exploit package allowing Galaxy S4 users to root their devices easily without having to wipe the device or flash a full prerooted factory image. It's completely supports Android 4.2.2 Jelly Bean with firmware build number I337UCUAMF3.

Disclaimer: Rooting voids the warranty of your device. We and the developer of this rooting procedures shall not be held responsible if any undesirable outcomes may happen to your device. use of this root guide is solely at your own risk!

Pre-requisites
1. Install USB Drivers for Samsung Galaxy S4 on the computer.
2. Install Android Terminal Emulator on your device.
3. Enable USB Debugging Mode on the phone by navigating to Settings >> Developer Options.
4. Make a backup of all your important data before following the guide.
5. Ensure the battery of the phone is charged more than 80 per cent.
6. The Root Exploit package works only on Samsung Galaxy S4 (AT&T) SGH-I337 running on Android 4.2.2 UCUAMF3 Jelly Bean firmware. Applying this to any incorrect variant might brick the device. Verify the model number of the Galaxy S4 by navigating to Settings >> About Phone.

File Required
1. Root Exploit (Mirror Link) for Galaxy S4 (AT&T) SGH-I337 (Root_for_ATTSG4_FM3.rar)

Steps to Root Galaxy S4 (AT&T) SGH-I337 Running on Android 4.2.2 UCUAMF3 Jelly Bean Firmware
Step 1: Extract Root Exploit package using WinRAR/7-Zip/WinZip or any other extracting tool.
Step 2: Insert a microSD card into your device. Make sure it is formatted as exFAT (not FAT32).

Note: If you have a 64GB microSD card you can use your phone to format it as exFAT by default directly from the Storage settings. However, if you have anything less than 64GB microSD card you may have to use the computer to format it manually as exFAT. Remember, if your microSD card is not formatted as exFAT you will see "permission denied" errors when running the exploit.

Step 3: Connect the Galaxy S4 to the computer using USB cable.
Step 4: Copy all files and folders from the Root Exploit package directly onto the root of your microSD card (nowhere else).
Step 5: Open the Android Terminal Emulator app on your phone, then run the following commands:

cd /mnt/extSdCard
./pwn
./script.sh

Note: After running the second command you should have seen your $ change to a # meaning you have root access. The third command is required to make this root access permanent.

Step 6: Once all commands are completed, close the Android Terminal Emulator app and check if SuperSU has any update in the Google Play Store.
Step 7: Open SuperSU app and let the binary update itself to the latest (if any updates are available).
Step 8: Once completed, reboot your device and confirm you still have root access.

Galaxy S4 (AT&T) SGH-I337 running on Android 4.2.2 UCUAMF3 Jelly Bean is now rooted successfully. You can now install any app that requires root permission. Verify the root status of the device by downloading Root Checker app from Google Play Store.

Note: Many Samsung devices store a flash counter that keeps track of how many times you have flashed custom firmwares to your device. Triangle Away can be used to reset the flash counter to zero.

Thank's to all fellas at XDA who first tried out this rooting technique. This method was originally posted via XDA-Developer original thread.

No comments:

Post a Comment