Well if it is indeed a "known exploit to gain root privileges" as the poster states, then the detection is valid. It is malicious in a way that gives your device more privileges through exploitation, which can be used for both good and bad purposes.
~!Donovan