|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source | Today's Posts | Search |
| LinkBack | Thread Tools | Display Modes |
01-13-2024, 21:29 | #16 (permalink) |
No Life Poster Join Date: Sep 2011 Location: karachi
Posts: 596
Member: 1655288 Status: Offline Thanks Meter: 90 | but an other dongle software succesful.. Selected model: Vivo PD1803 (Vivo Y83) Operation: Repair Software version: 6.3 Connect Type-C to NONE... OK Host Power Off... OK Connect phone to [PC] in BROM/PRELOADER Mode Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1633 (Android),usb2ser.sys,3.0.1504.0] Device found at COM35 [PRELOADER] Open port... OK Send start cmd... OK Get HW code from device... 0766 Get sec config... OK [00000005] Active sec flags: [SBC DAA] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6765] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Force switch to BROM... OK Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0] Device found at COM53 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0766 Get sec config... OK [000000E5] Active sec flags: [SBC DAA] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6765] LibUSB installed Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Release testpoint, waiting 2 seconds Advanced Bypass Security... OK Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0] Device found at COM53 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0766 Get sec config... OK [000000E0] Active sec flags: [] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6765] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0xF10CA944, 0x3AEE90EC, 0x1256993C, 0x1270C79F Get Chip ID... [MT6765] Get SOC ID... [CC61C79358A407C5E13AA6E5C2AC4FDD51E1AA344698792E30 9AB4656CC13973] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [7] Send preloader... OK Start preloader... OK Checking preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK EMMC_ID: 0x15010052483634414205A4D09B8555CF Load EMI from phone... OK Parse EMI config... OK Init EXT RAM... OK Send 2nd DA... OK Get device info... OK EMMC INFO: EMMC_CNAME: RH64AB EMMC_ID : 0x15010052483634414205A4D09B8555CF EMMC_BOOT1: 0x0000400000 (4.00Mb) EMMC_BOOT2: 0x0000400000 (4.00Mb) EMMC_RPMB : 0x0000400000 (4.00Mb) EMMC_USER : 0x0E8F800000 (58.24Gb) RAM INFO: INT_SRAM: 0x000003A000 (232.00Kb) EXT_RAM : 0x0100000000 (4.00Gb) Checking USB status... USB_HIGH_SPEED Read partitions info from phone... OK Checking A/B state... OK Read product info... [EXT4] ... OK Product Brand : vivo Product Manufacturer : vivo Product Model : vivo Y83 Product Name : PD1803BF_EX Product Device : PD1803BF_EX Product Board : k62v1_64_bsp Board Platform : MTK6765 Build ID : O11019 Build Date : Sat Nov 16 11:57:55 CST 2019 Display ID : O11019 release-keys Security Patch : 2019-11-05 Version SDK : 27 Version Release : 8.1.0 Version Codename : REL Firmware Version : 1573876683 Userdata FS Type : EXT4 Reading security from phone... OK IMEI 1: 356877170====== IMEI 2: 35687717====== Set new IMEI to: IMEI 1: 356877170==== IMEI 2: 3568771702==== Searching security key... found! [1] Writing security to phone... OK Repair Security done! |
01-24-2024, 14:24 | #17 (permalink) |
Junior Member Join Date: Dec 2017 Location: Kampala
Posts: 15
Member: 2793249 Status: Offline Thanks Meter: 7 | HEY TEAM PLEASE REFUND MY CREDITS A136U , I UNLOCKED NETWORK JOB SUCESSFULL BUT STILL NETWORK LOCK IS THERE Selected model: Samsung SM-A136U (Samsung Galaxy A13 5G) Operation: Unlock network (Server) Software version: 6.3 Checking Login and Password... OK Balance: 30 crd. You have 30 credit(s) left. This operation takes 5 credits. Continue? Yes Searching Samsung modem... detected COM173 Reading phone info... OK Model: SM-A136U AP version: A136USQS3BVI1 CSC version: A136UOYN3BVI1 CP version: A136USQS3BVI1 OS version: 12 Product code: GCF Carrier ID: XAA Phone SN: R5CT60NNKEX Unique number: CDC008464CA0B39 IMEI: 358997694758124 IMEI Certi: PASS Powering off... OK Host Power Off... OK Switch virtual port to USB... OK Connect Type-C to BOX... OK Host Power On... OK Connect phone to [BOX] in BROM mode Waiting for device... OK Read usbhost speed... HIGH Read Device Descriptor... Get VID/PID...0E8D/0003 Send start cmd... OK Get HW code from device... 0989 Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6833] Get sec config... OK [000000E5] Active sec flags: [SBC DAA] Release testpoint Advanced Bypass Security... OK Switch virtual port to NONE... OK Connect Type-C to HUB... OK Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0] Device found at COM20 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0989 Get sec config... OK [000000E0] Active sec flags: [] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6833] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0xA31BADA6, 0xF19C9E57, 0xBCFE0A9B, 0x77FE1032 Get Chip ID... [MT6833] Get SOC ID... [2BE837A5F52CDA226C1AA7424F5D24A1182E1C0C6626AA9B95 7BD9AAAFEB58B8] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [14] Send preloader... OK Start preloader... OK Checking preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK EMMC_ID: 0x150100444336444D42008464CA0B393F Load EMI from phone... OK Parse EMI config... OK Init EXT RAM... OK Send 2nd DA... OK Get device info... OK EMMC INFO: EMMC_CNAME: DC6DMB EMMC_ID : 0x150100444336444D42008464CA0B393F EMMC_BOOT1: 0x0000400000 (4.00Mb) EMMC_BOOT2: 0x0000400000 (4.00Mb) EMMC_RPMB : 0x0001000000 (16.00Mb) EMMC_USER : 0x0E8F800000 (58.24Gb) RAM INFO: INT_SRAM: 0x0000070000 (448.00Kb) EXT_RAM : 0x0100000000 (4.00Gb) Checking USB status... USB_HIGH_SPEED Read partitions info from phone... OK Checking A/B state... OK Read product info... [EXT4] ... OK Product Brand : samsung Product Manufacturer : samsung Product Model : SM-A136U Product Name : a13xsq Product Device : a13x Product Board : a13x Board Platform : mt6833 Build ID : SP1A.210812.016 Build Date : Thu Sep 22 21:18:22 KST 2022 Display ID : SP1A.210812.016.A136USQS3BVI1 Security Patch : 2022-10-01 Version SDK : 31 Version Release : 12 Version Codename : REL Firmware Version : A136USQS3BVI1 Userdata FS Type : F2FS Read security partition from phone... OK Read security files... OK Read lock info... OK Searching server... OK Waiting for server answer... OK Unlocking ... [1] ... OK Write lock info... OK Write security partition to phone... OK Network Unlock done! |
01-27-2024, 21:30 | #19 (permalink) |
No Life Poster Join Date: Sep 2011 Location: karachi
Posts: 596
Member: 1655288 Status: Offline Thanks Meter: 90 | after repair imei succesfull but imei not showing but baseband ok plz fix or update XIOUMI REDMI patch cerficates asap thanks Selected model: Xiaomi Redmi A1+ (Ice) Operation: Repair Software version: 6.3 Connect Type-C to NONE... OK Host Power Off... OK Connect phone to [PC] in BROM/PRELOADER Mode Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0] Device found at COM53 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0717 Get sec config... OK [000000E7] Active sec flags: [SBC SLA DAA] Get HW & SW version from device... OK HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00 Detect chip [MT6761] LibUSB installed Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Release testpoint, waiting 2 seconds Advanced Bypass Security... OK Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0] Device found at COM53 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0717 Get sec config... OK [000000E0] Active sec flags: [] Get HW & SW version from device... OK HW VER: CA01, SW VER: 0200, HW SUB CODE: 8A00 Detect chip [MT6761] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0x39468DA8, 0x022039E8, 0x0DE47909, 0x106819CC Get Chip ID... [MT6761] Get SOC ID... [ED032ACEF15ED53C18AA946DB390196798E97FD158BEEA047E 77A8F9EFE63A0C] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [5] Send preloader... OK Start preloader... OK Checking preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK EMMC_ID: 0x9B0100593250303332001264207099C1 Load EMI from phone... OK Parse EMI config... OK Init EXT RAM... OK Send 2nd DA... OK Get device info... OK EMMC INFO: EMMC_CNAME: Y2P032 EMMC_ID : 0x9B0100593250303332001264207099C1 EMMC_BOOT1: 0x0000400000 (4.00Mb) EMMC_BOOT2: 0x0000400000 (4.00Mb) EMMC_RPMB : 0x0001000000 (16.00Mb) EMMC_USER : 0x0747C00000 (29.12Gb) RAM INFO: INT_SRAM: 0x000003A500 (233.25Kb) EXT_RAM : 0x0080000000 (2.00Gb) Checking USB status... USB_HIGH_SPEED Read partitions info from phone... OK Checking A/B state... OK [A] Read product info... [EROFS] ... OK Product Brand : Redmi Product Manufacturer : Xiaomi Product Model : ice Product Name : ice_eea Product Device : ice Product Board : ice Board Platform : mt6761 Build ID : SP1A.210812.016 Build Date : Thu Sep 15 21:06:36 CST 2022 Display ID : 12 V13.0.3.0.SGMEUXM Security Patch : 2022-09-01 Version SDK : 31 Version Release : 12 Version Codename : REL Firmware Version : V13.0.3.0.SGMEUXM Userdata FS Type : F2FS Read partition "nvdata"... OK Read partition "nvram"... OK Read NVDATA files... OK Read NVRAM files... OK Read IMEI... error Repairing IMEI... IMEI 2: 3500======== Write IMEI and patch CERT [NVDATA]... OK Load partiton for patching... OK Patching... OK Selected "Auto unlock bootloader" Read security partition from phone... OK Decrypting security data... OK Encrypt security data... OK Write security partition to phone... OK Unlock bootloader done! Selected "Disable VBMETA verification" Read security partition from phone... OK Write security partition to phone... OK Write IMEI and patch CERT [NVRAM]... OK Write partition "nvdata"... OK Write partition "nvram"... OK Repair Security and Patch cert done! If your phone after repair keeps rebooting - use wipe data option. |
01-28-2024, 15:42 | #20 (permalink) |
Freak Poster Join Date: Oct 2006 Location: SOUTH AFRICA
Posts: 156
Member: 366884 Status: Offline Thanks Meter: 12 | Thanks for the great update. Nevertheless, i have an issue. Please, I need help from anyone with experience on this type of issue. I was resetting a Nokia G10 via test point with Pandora, all went well as usual but surprisingly the phone stays in mtk Port and will not turn on. It now connects without test point attached anytime i try it out. Please any help as how to release the phone from shortened test point. |
02-21-2024, 21:52 | #21 (permalink) |
No Life Poster Join Date: Sep 2011 Location: karachi
Posts: 596
Member: 1655288 Status: Offline Thanks Meter: 90 | Disable additional lock... error(1) fix this plz Selected model: Realme RMX2001 (Realme 6/6s) Operation: Repair Software version: 6.3 Connect Type-C to NONE... OK Host Power Off... OK Connect phone to [PC] in BROM/PRELOADER Mode Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1511.0] You are using driver version 3.0.1511.0, we recommend using version 3.0.1504.0 for proper operation. You can install the correct driver from the program directory. Device found at COM60 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0813 Get sec config... OK [000000E5] Active sec flags: [SBC DAA] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6785] LibUSB installed Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Release testpoint, waiting 2 seconds Advanced Bypass Security... OK Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1511.0] You are using driver version 3.0.1511.0, we recommend using version 3.0.1504.0 for proper operation. You can install the correct driver from the program directory. Device found at COM60 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0813 Get sec config... OK [000000E0] Active sec flags: [] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6785] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0x1F8D0D8C, 0xC3003577, 0xC46914A2, 0xA83F1DD2 Get Chip ID... [MT6785] Get SOC ID... [182B2175281DA2EDD84D694A21B1186314DBED94F3D2D8FFC9 B5B6A00A88B546] Get sec config... OK [000000E0] Load DownloadAgent... OK Search DA... OK [12] Send preloader... OK Start preloader... OK Checking preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK UFS CID (FW VER): KM8V8001JM-B813 (1500) Load EMI from phone... OK Parse EMI config... OK Init EXT RAM... OK Send 2nd DA... OK Get device info... OK UFS INFO: UFS_CID : KM8V8001JM-B813 UFS_FWVER : 1500 BLOCK_SIZE: 0x0000001000 (4.00Kb) UFS_LU0 : 0x0000400000 (4.00Mb) UFS_LU1 : 0x0000400000 (4.00Mb) UFS_LU2 : 0x1DCB000000 (119.17Gb) RAM INFO: INT_SRAM: 0x0000080000 (512.00Kb) EXT_RAM : 0x0200000000 (8.00Gb) Checking USB status... USB_HIGH_SPEED Read partitions info from phone... OK Checking A/B state... OK Read product info... [EXT4] ... OK Product Brand : realme Product Manufacturer : realme Product Model : RMX2002 Product Device : RMX2001 Product Board : oppo6785 Board Platform : mt6785 Build ID : QP1A.190711.020 Build Date : Mon Aug 17 18:07:20 CST 2020 Display ID : RMX2002_11_B.45 Security Patch : 2020-08-05 Version SDK : 29 Version Release : 10 Version Codename : REL Userdata FS Type : EXT4 Read partition "nvdata"... OK Read partition "nvram"... OK Read NVDATA files... OK Read NVRAM files... OK Repairing IMEI... IMEI 1: 35294======== IMEI 2: 35294======== Write IMEI and patch CERT [NVDATA]... OK Checking patch type... [1] Patching partition... OK Save patched partiton... OK Read security partition from phone... OK Decrypting security data... OK Encrypt security data... OK Write security partition to phone... OK Checking additional lock... [ENABLED] Disable additional lock... error(1) |
02-23-2024, 09:12 | #22 (permalink) |
Freak Poster Join Date: Oct 2015
Posts: 203
Member: 2466934 Status: Offline Thanks Meter: 54 | Where is download Link? Shell requires a Z3x card to download Pandora tool.. but i dont have z3x, i only have pandora online.. should i need to buy z3x box too? or i should download pandora tool from other random websites?? image_2024-02-23_131514869.jpg |
03-04-2024, 11:30 | #24 (permalink) |
Product Supporter Join Date: Feb 2008 Location: z3x
Posts: 16,034
Member: 706257 Status: Offline Thanks Meter: 5,082 | |
The Following User Says Thank You to Z3X For This Useful Post: |
03-05-2024, 07:34 | #25 (permalink) |
No Life Poster Join Date: Jul 2011 Location: Nairobi, Kenya
Posts: 540
Member: 1610674 Status: Offline Sonork: 210921 Thanks Meter: 217 | thanks for the grate update team but please fix back preloader functions services to do with RPMB and unlock for samsung devices now not working in preloader mode gives a warning this funtion only works with advanced authorization yet in previous version was working well |
Bookmarks |
| |
|