Latest EVO 4G root uses Flash Lite exploit to do its deed
![](https://s.yimg.com/ny/api/res/1.2/hf59mwYyEkSAGWR8L7Y8XA--/YXBwaWQ9aGlnaGxhbmRlcjt3PTk2MDtoPTY3NA--/https://s.yimg.com/uu/api/res/1.2/y3TiKbuosoTRQh_Rd.4ufg--~B/aD00MjE7dz02MDA7YXBwaWQ9eXRhY2h5b24-/https://www.blogcdn.com/www.engadget.com/media/2010/06/100614-evo4g-01.jpg)
The cat-and-mouse struggle between Android users, carriers, and manufacturers to gain, patch, and re-gain root is one that shows no signs of slowing down, but the EVO 4G's latest recommended root method is particularly creative. Made necessary after the most recent over-the-air firmware update patched the old way of doing it, you've now got to visit a page on Adobe's site for tweaking local Flash settings, at which point a script works some magic and apparently takes advantage of a vulnerability in the EVO's Flash Lite build. Of course, that's just one of twelve harrowing steps in the whole process -- but regardless, it's not often we're thanking our lucky stars for a security issue.