From 54de0f0d6a3b26fcf73d7743f71347b951d86f9f Mon Sep 17 00:00:00 2001 From: throwaway96 <68320646+throwaway96@users.noreply.github.com> Date: Sat, 24 Dec 2022 12:21:26 -0500 Subject: [PATCH] Add notice about patch status to README.md --- README.md | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/README.md b/README.md index 983df9b..596d880 100644 --- a/README.md +++ b/README.md @@ -11,6 +11,16 @@ If you want the full details of how the exploit works, [skip ahead to our writeu # Is my TV vulnerable? +--- + +*Update (2022-12-24)*: **The vulnerabilities used by RootMyTv (both v1 and v2) have been patched by LG. +RootMyTV is unlikely to work on firmware released since mid-2022.** +If you get a `"Denied method call "download" for category "/""` error, your TV is patched. +If your TV reboots but Homebrew Channel is not installed, it is likely patched. +Firmware downgrades are no longer possible without already having root access. + +--- + At the time of writing the original exploit (RootMyTV v1 - 2021-05-15), all webOS versions between 3.4 and 6.0 we tested (TVs released between mid-2017 and early-2021) are supported by this exploit chain. Around June-July 2021 LG