Closed tehbra1n closed 3 years ago
[2021-05-10 10:34:45.657066] Insecure device, sending payload using send_da
The device is already insecure, there's no need for bypass.
[2021-05-10 10:34:45.657066] Insecure device, sending payload using send_da
The device is already insecure, there's no need for bypass.
Roger that. FWIW I was trying the exploit to get around always getting a DA ERROR running the SP TOOL under Windows 10. I resolved this by running the Linux SP TOOL from a bootable thumb drive on the same laptop that I was trying to get it to work under Windows 10 on. No idea on this one but using fireiso-2.0.0, downloading the tool and firmware after booting and running the tool worked the first time.
device: Unihertz Jelly 2 cpu: MT6771
Device is bootlooping, as it loops it reveals the PreLoader VCOM port (COM4) for about 2s then the Mediatek USB Port (COM3) for about 2s, then repeats. Below is the output from main.py.
I'm not sure if I'm not timing running the script correctly or if I'm missing something else.