background

This Snapdragon 8 Elite Gen 5 Exploit Lets Xiaomi 17 Users Bypass Bootloader Lock on Android 16

Xiaomi 17 in China has been affected but a fix is on the way with upcoming HyperOS release

Abubakar Mohammed profile pictureby Abubakar Mohammed
Link Copied
copy link iconcopy link icon
Qualcomm Snapdragon 8 Elite Gen 5 illustration

Image Credit: Qualcomm

Summary

  • The Qualcomm GBL Exploit uses Android Bootloader (ABL) on Android 16 to allow unsigned code execution on Snapdragon 8 Elite Gen 5.
  • By chaining this flaw with a fastboot command and changing SELinux to Permissive, a custom app can unlock the bootloader.
  • This allows users to bypass unlocking rules on Xiaomi 17, although no reports about other phones have been reported yet.
Click Here to Add Beebom Gadgets As A Trusted SourceGoogleAdd as a preferred source on Google

Not too long after the discovery of the recent MediaTek vulnerability, a new exploit chain has come knocking on Qualcomm's door. This time, it affects flagship smartphones running Android 16, allowing users to bypass the OEM restrictions on Snapdragon 8 Elite Gen 5-powered smartphones. This way, Xiaomi 17 users can actually unlock the bootloader. 

Xiaomi 17 bootloader unlock possible now

Reported first by Android Authority with inputs from developer Roger Ortiz, a new exploit discovered in Qualcomm processors allows effortless bootloader unlocking, primarily on recent Xiaomi smartphones powered by the Snapdragon 8 Elite Gen 5 chipset

Qualcomm Snapdragon 8 Elite Gen 5 illustration
Image Credit: Beebom Gadgets
Qualcomm Snapdragon 8 Elite Gen 5 illustration
Image Credit: Beebom Gadgets

Dubbed as the Qualcomm GBL Exploit, the vulnerability targets how these smartphones load the Generic Bootloader Library. On Android 16, Qualcomm's Bootloader ABL loads the GBL from the efisp partition but fails to verify its authenticity, allowing unsigned code execution.

Imagine this as opening the door for one person out of the two to enter your home and then forgetting to close it, leading to the other entering as well. To make the exploit work, it is used with another security flaw.

By exploiting a fastboot command called fastboot oem set-gpu-preemption, users can force the phone's SELinux security into Permissive mode. Upon reboot, a custom app runs unchecked and permanently unlocks the bootloader.

Xiaomi 17 in blue colourway from the back and front
Image Credit: Xiaomi
Xiaomi 17 in blue colourway from the back and front
Image Credit: Xiaomi

For those unaware, SELinux is a module in Android's kernel that restricts actions with root privileges if they don't meet Android's set security standards. The fastboot command allows a user to override that security setting as a developer (with Developer Options turned on).

This workaround has been a massive breakthrough for Xiaomi 17 users in China, allowing them to bypass the brand's strict unlocking restrictions, which require users to wait for weeks. However, this vulnerability could be patched soon, as the report suggests Xiaomi is preparing a new Hyper OS 3.0.304.0 update to fix the issue.

While there haven't been any reports of this system working on other Snapdragon 8 Elite Gen 5 smartphones like Galaxy S26 Ultra or OnePlus 15, this exploit could theoretically allow users to unlock the bootloader on other devices too. Users especially fed up with Samsung's recent decision to kill Odin, could potentially try this at their own risk.

Abubakar Mohammed profile picture

Guides Writer

Expertise :

Abubakar is a seasoned Tech Journalist who covers everything Android and consumer electronics. He's a die-hard self-repair enthusiast who loves to dive into the specifics of consumer tech. In his free time, you will find him writing lyrical poetry. He has previously worked with Android Police and How-to Geek.

Recommended For You

Popular Mobile List