|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source | Today's Posts | Search |
| LinkBack | Thread Tools | Display Modes |
03-11-2023, 15:13 | #1 (permalink) |
No Life Poster Join Date: Oct 2007 Location: Dominican Republic Age: 40
Posts: 618
Member: 605730 Status: Offline Sonork: 100.1605690 Thanks Meter: 70 | tlc t779w unlock done select tlc t767w [Done] Operation: Unlock network Software version: 4.6 Work ID: 890127 Connect phone in BROM Mode Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0] Device found at COM5 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0989 Get sec config... OK [000000E7] Active sec flags: [SBC SLA DAA] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 LibUSB installed Detect chip [MT6833] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Advanced Bypass Security... OK Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0] Device found at COM5 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0989 Get sec config... OK [000000E0] Active sec flags: [] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 LibUSB installed Detect chip [MT6833] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0x27A20FA5, 0x1277D805, 0x21C7102A, 0x6FA49C1F Get Chip ID... [MT6833] Get SOC ID... [A47DB95141D452E241874C0C48E7F37B9D1CB5AEFCD0F60D00 310C3DA84E76BF] Get sec config... OK [000000E0] Get hw mode... OK Load DownloadAgent... OK Search DA... OK [14] Send preloader... OK Start preloader... OK Checking preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK UFS CID (FW VER): KM5L9001DM-B424 (0100) Load EMI from phone... OK Parse EMI config... OK Init EXT RAM... OK Send 2nd DA... OK Get device info... OK UFS INFO: UFS_CID : KM5L9001DM-B424 UFS_FWVER : 0100 BLOCK_SIZE: 0x0000001000 (4.00Kb) UFS_LU0 : 0x0000400000 (4.00Mb) UFS_LU1 : 0x0000400000 (4.00Mb) UFS_LU2 : 0x1DCB000000 (119.17Gb) RAM INFO: INT_SRAM: 0x0000070000 (448.00Kb) EXT_RAM : 0x0100000000 (4.00Gb) Checking USB status... USB_HIGH_SPEED Read partitions info from phone... OK Checking A/B state... OK [B] Read product info... OK Product Manufacturer : TCL Product Board : MT6853 Board Platform : connac1x Build ID : SP1A.210812.016 Build Date : Fri Jan 13 00:34:45 CST 2023 Display ID : SP1A.210812.016 release-keys Security Patch : 2023-01-01 Version SDK : 31 Version Release : 12 Version Codename : REL Firmware Version : 6E9N Read security partition from phone... OK Read security files... OK Read security files... OK Read lock info... OK Unlock... OK [DF1, GB1, GB2] Write lock info... OK Write security partition to phone... OK Network Unlock done! |
The Following 3 Users Say Thank You to landeta For This Useful Post: |
03-11-2023, 20:24 | #3 (permalink) |
Freak Poster Join Date: Feb 2009 Location: Cuba Age: 38
Posts: 249
Member: 983297 Status: Offline Thanks Meter: 61 | I have a client that have one from Metropcs app unlock , that method work for this model too ? Thansk by your reports, I will wait for the client if broght me the phone to test the unlock |
The Following User Says Thank You to nelmaster_vc For This Useful Post: |
06-06-2023, 13:12 | #4 (permalink) |
No Life Poster Join Date: Jul 2005 Location: Cameroon Age: 52
Posts: 906
Member: 163755 Status: Offline Thanks Meter: 126 | TCL T779W trying to unlock Selected model: TCL T767W (TCL 30XE 5G) Operation: Unlock network Software version: 5.0 Work ID: 3153333 Connect phone in BROM/PRELOADER Mode Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0] Device found at COM66 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0989 Get sec config... OK [000000E7] Active sec flags: [SBC SLA DAA] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6833] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Release testpoint, waiting 2 seconds Advanced Bypass Security... OK Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0] Device found at COM66 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0989 Get sec config... OK [000000E0] Active sec flags: [] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6833] LibUSB installed Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0xAC292F38, 0x53D21879, 0xEAD1D02C, 0xBB01C539 Get Chip ID... [MT6833] Get SOC ID... [E750AB96C8A00EFF6CE953F6A2C7E4C27952CB2778A090AC69 A09925993C0A15] Get sec config... OK [000000E0] Get hw mode... OK Load DownloadAgent... OK Search DA... OK [14] Send preloader... OK Start preloader... OK Checking preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK UFS CID (FW VER): KM5L9001DM-B424 (0100) Load EMI config from database [DB VER: 206 DB DATE: 05-25-2022] OK [1] Trying EMI [F7581BCD] Init EXT RAM... OK Send 2nd DA... OK Get device info... OK UFS INFO: UFS_CID : KM5L9001DM-B424 UFS_FWVER : 0100 BLOCK_SIZE: 0x0000001000 (4.00Kb) UFS_LU0 : 0x0000400000 (4.00Mb) UFS_LU1 : 0x0000400000 (4.00Mb) UFS_LU2 : 0x1DCB000000 (119.17Gb) RAM INFO: INT_SRAM: 0x0000070000 (448.00Kb) EXT_RAM : 0x0100000000 (4.00Gb) Checking USB status... USB_HIGH_SPEED Read partitions info from phone... OK Checking A/B state... OK [B] Read security partition from phone... OK Load security file error! |
09-13-2023, 03:40 | #5 (permalink) |
Freak Poster Join Date: Mar 2010 Location: West Africa
Posts: 126
Member: 1263334 Status: Offline Sonork: 100.1651849 Thanks Meter: 28 | Selected model: TCL T767W (TCL 30XE 5G) Operation: Unlock network Software version: 5.8 Host Power Off... OK Switch virtual port to USB... OK Connect Type-C to BOX... OK Host Power On... OK Connect phone to [BOX] in BROM mode Waiting for device... OK Read usbhost speed... HIGH Read Device Descriptor... Get VID/PID...0E8D/0003 Send start cmd... OK Get HW code from device... 0989 Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6833] Get sec config... OK [000000E7] Active sec flags: [SBC SLA DAA] Release testpoint Advanced Bypass Security... OK Switch virtual port to NONE... OK Connect Type-C to HUB... OK Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0] Device found at COM3 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0989 Get sec config... OK [000000E0] Active sec flags: [] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6833] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0xDA602523, 0x8EDC1774, 0x67ABD9BA, 0x9F8A65BA Get Chip ID... [MT6833] Get SOC ID... [D39B6CA61CD7DF2DE4EE059FC0CF9E5420B2809C20EE9EF9C1 620DFDBE8946FC] Get sec config... OK [000000E0] Get hw mode... OK Load DownloadAgent... OK Search DA... OK [14] Send preloader... OK Start preloader... OK Checking preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK UFS CID (FW VER): MT064GASAO2U21 (0608) Load EMI from phone... OK Parse EMI config... OK Init EXT RAM... OK Send 2nd DA... OK Get device info... OK UFS INFO: UFS_CID : MT064GASAO2U21 UFS_FWVER : 0608 BLOCK_SIZE: 0x0000001000 (4.00Kb) UFS_LU0 : 0x0000400000 (4.00Mb) UFS_LU1 : 0x0000400000 (4.00Mb) UFS_LU2 : 0x0EE5800000 (59.59Gb) RAM INFO: INT_SRAM: 0x0000070000 (448.00Kb) EXT_RAM : 0x0100000000 (4.00Gb) Checking USB status... USB_HIGH_SPEED Read partitions info from phone... OK Checking A/B state... OK [A] Read product info... [EXT4] ... OK Product Manufacturer : TCL Product Model : mssi_64_ww_armv82 Product Board : MT6853 Board Platform : connac1x Build ID : SP1A.210812.016 Build Date : Mon Aug 14 13:21:12 CST 2023 Display ID : SP1A.210812.016 release-keys Security Patch : 2023-08-01 Version SDK : 31 Version Release : 12 Version Codename : REL Firmware Version : GPDA Userdata FS Type : F2FS Read security partition from phone... OK Read security files... OK Read security files... OK Read lock info... OK Unlock... OK [DF1, GB1, GB2] Write lock info... OK Write security partition to phone... OK Network Unlock done! |
The Following User Says Thank You to Nutty70 For This Useful Post: |
09-13-2023, 03:40 | #6 (permalink) |
Freak Poster Join Date: Mar 2010 Location: West Africa
Posts: 126
Member: 1263334 Status: Offline Sonork: 100.1651849 Thanks Meter: 28 | Selected model: TCL T767W (TCL 30XE 5G) Operation: Unlock network Software version: 5.8 Host Power Off... OK Switch virtual port to USB... OK Connect Type-C to BOX... OK Host Power On... OK Connect phone to [BOX] in BROM mode Waiting for device... OK Read usbhost speed... HIGH Read Device Descriptor... Get VID/PID...0E8D/0003 Send start cmd... OK Get HW code from device... 0989 Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6833] Get sec config... OK [000000E7] Active sec flags: [SBC SLA DAA] Release testpoint Advanced Bypass Security... OK Switch virtual port to NONE... OK Connect Type-C to HUB... OK Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0] Device found at COM3 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0989 Get sec config... OK [000000E0] Active sec flags: [] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6833] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0xDA602523, 0x8EDC1774, 0x67ABD9BA, 0x9F8A65BA Get Chip ID... [MT6833] Get SOC ID... [D39B6CA61CD7DF2DE4EE059FC0CF9E5420B2809C20EE9EF9C1 620DFDBE8946FC] Get sec config... OK [000000E0] Get hw mode... OK Load DownloadAgent... OK Search DA... OK [14] Send preloader... OK Start preloader... OK Checking preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK UFS CID (FW VER): MT064GASAO2U21 (0608) Load EMI from phone... OK Parse EMI config... OK Init EXT RAM... OK Send 2nd DA... OK Get device info... OK UFS INFO: UFS_CID : MT064GASAO2U21 UFS_FWVER : 0608 BLOCK_SIZE: 0x0000001000 (4.00Kb) UFS_LU0 : 0x0000400000 (4.00Mb) UFS_LU1 : 0x0000400000 (4.00Mb) UFS_LU2 : 0x0EE5800000 (59.59Gb) RAM INFO: INT_SRAM: 0x0000070000 (448.00Kb) EXT_RAM : 0x0100000000 (4.00Gb) Checking USB status... USB_HIGH_SPEED Read partitions info from phone... OK Checking A/B state... OK [A] Read product info... [EXT4] ... OK Product Manufacturer : TCL Product Model : mssi_64_ww_armv82 Product Board : MT6853 Board Platform : connac1x Build ID : SP1A.210812.016 Build Date : Mon Aug 14 13:21:12 CST 2023 Display ID : SP1A.210812.016 release-keys Security Patch : 2023-08-01 Version SDK : 31 Version Release : 12 Version Codename : REL Firmware Version : GPDA Userdata FS Type : F2FS Read security partition from phone... OK Read security files... OK Read security files... OK Read lock info... OK Unlock... OK [DF1, GB1, GB2] Write lock info... OK Write security partition to phone... OK Network Unlock done! |
The Following User Says Thank You to Nutty70 For This Useful Post: |
03-27-2024, 20:51 | #9 (permalink) |
No Life Poster Join Date: May 2005 Location: bridgetown Age: 59
Posts: 1,275
Member: 146939 Status: Offline Sonork: 100.1609615 Thanks Meter: 246 | geting error Connect phone in BROM Mode Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0] Device found at COM23 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0989 Get sec config... OK [000000E7] Active sec flags: [SBC SLA DAA] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6833] LibUSB installed Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Release testpoint, waiting 2 seconds Advanced Bypass Security... OK Waiting for device... OK Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0] Device found at COM23 [BROM] Open port... OK Send start cmd... OK Get HW code from device... 0989 Get sec config... OK [000000E0] Active sec flags: [] Get HW & SW version from device... OK HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00 Detect chip [MT6833] Library Version [2] Select platform... OK Init BROM... OK Force Charge... OK Disable WatchDog Timer... OK Reopen port for libver2... OK Get ME ID... OK ME_ID = 0x1A23AC9D, 0x053CED73, 0x8697E9CB, 0x10061A52 Get Chip ID... [MT6833] Get SOC ID... [FCEFB0C64201B6BDBD854E3819A39D78CFF218C2241A4FFF27 B6E43654BBB3C9] Get sec config... OK [000000E0] Get hw mode... OK Load DownloadAgent... OK Search DA... OK [14] Send preloader... OK Start preloader... OK Checking preloader answer... OK Send bootloader... OK Start bootloader... OK Wait for answer from bootloader... OK Send SYNC signal... OK Setup device enviroment... OK Setup device parametres... OK Receive DA SYNC signal... OK Set DA parametres... OK Get device connection agent... [BROM] Get device info... OK UFS CID (FW VER): KM5P9001DM-B424 (0100) Load EMI from phone... OK Parse EMI config... OK Init EXT RAM... OK Send 2nd DA... OK Get device info... OK UFS INFO: UFS_CID : KM5P9001DM-B424 UFS_FWVER : 0100 BLOCK_SIZE: 0x0000001000 (4.00Kb) UFS_LU0 : 0x0000400000 (4.00Mb) UFS_LU1 : 0x0000400000 (4.00Mb) UFS_LU2 : 0x0EE5800000 (59.59Gb) RAM INFO: INT_SRAM: 0x0000070000 (448.00Kb) EXT_RAM : 0x0100000000 (4.00Gb) Checking USB status... USB_HIGH_SPEED Read partitions info from phone... OK Checking A/B state... OK [A] Read product info... [EXT4] ... OK Product Brand : TCL Product Manufacturer : TCL Product Model : T767W Product Name : T767WB Product Device : Buffalo_Boost Product Board : MT6853 Board Platform : mt6833 Build ID : SP1A.210812.016 Build Date : Fri May 13 13:03:15 UTC 2022 Display ID : SP1A.210812.016 release-keys Security Patch : 2022-03-05 Version SDK : 31 Version Release : 12 Version Codename : REL Firmware Version : BKA7 Read security partition from phone... OK Read security files... OK Read NVDATA files... OK Calculating... OK Read lock info... error(ERR_READ_SEC_2.7) Selected model: TCL T767W (TCL 30XE 5G) Operation: Unlock network Software version: 6.7 Work ID: 23571664 |
03-27-2024, 20:56 | #10 (permalink) | |
Product Supporter Join Date: Feb 2008 Location: z3x
Posts: 16,136
Member: 706257 Status: Offline Thanks Meter: 5,106 | Quote:
| |
Bookmarks |
| |
|