iOS 14.5.1-14.0, Massive Jailbreak Archived – By LinusHenze, 9 years later, UNTETHERED Jailbreak is back on the ground.
Great news for those who are waiting for Jailbreak to iOS 14.4 to iOS 14.5.1, The untethered jailbreak has been achieved.
This iOS 14.5.1 UNTETHERED Jailbreak runs on A12, A13, A14 (iPhone 12), and older devices, and will support Apple’s upcoming iPhone 13 series.
Also Read: How to Jailbreak iOS 14.5.1 and Lower
The well-known security researcher posted a quote “Jailbreak – Demo of CVE-2021-30740, CVE-2021-30768, CVE-2021-30769, CVE-2021-30770, and CVE-2021-30773 works on iOS 14.5.1, iPhone 12 Pro Max.
According to his Demo, It’s a fully working Untethered for 14.5.1 and Lower, Once the developer will get released this to the public, we are able to create an untethered jailbreak for iOS 14.5.1 and Lower.
So following devices will be compatible with this Jailbreak/Exploit.
iOS 14.0.1, iOS 14.1, iOS 14.2, iOS 14.2 v2, iOS 14.2.1, iOS 14.3, iOS 14.4, iOS 14.4.1, iOS 14.4.2, iOS 14.5, iOS 14.5.1
And also we can see Sileo Package Manager running fine on 14.5.1 on his A14 device. One of the famous YouTuber GeoSn0w- iDevice Central, send the message to the developer of this jailbreak tool, then he( LinusHenze ) confirmed they will release this exploit and also untether after October because 90 days have to pass that vulnerability.
Also Read: How to downgrade iPhone/iPad
This is Untethered Jailbreak its means, once you are rebooted your iPhone/iPad you don’t need to install or sideload the jailbreak app to go again jailbroken mode.
The last Untethered Jailbreak tool was released on 14 October 2015, for iOS 9.0 through 9.0.2. the tool was developed by Pangu Team calling Pangu9 Jailbreak too.
This tool was supported for Windows and Mac OS.
Untethered Jailbreak Process: By iPhone Wiki
Most untethered jailbreaks rely on vulnerabilities in the kernel and early boot process, typically using a combination of codesigning bypasses and manipulating the system into executing a binary early in the boot process (or obtaining unsigned code execution via a vulnerability in an existing startup process).
Once code execution has been obtained, a kernel exploit is used in order to patch the currently loaded kernel to allow for the rootfs to be remounted as read/write, and to allow for unsigned code execution.By – https://www.theiphonewiki.com/wiki/Untethered_jailbreak
So this means once you run the jailbreak, every time you reboot the device you don’t need to resign again, You don’t need to Re-Jailbreak your device.
This is a complete jailbreak tool + Exploit, coming with Sileo package manager. According to GeoSn0w and LinusHenze's conversation, this will be released after Octomber.