MTK-bypass / bypass_utility

MIT License
488 stars 118 forks source link

Rom_Dump - Insecure device, sending payload using send_da Found send_dword, dumping bootrom to bootrom_690.bin #62

Closed ghost closed 2 years ago

ghost commented 2 years ago

Hello, I have a problem when I want to bypass my Umidigi A5 Pro. I wanted to flash the phone, something went wrong and the preloader crashed. What exactly do I have to do? Please help!

PS C:\bypass_utility-v.1.4.2> python main.py [2021-10-13 19:28:48.506446] Waiting for device [2021-10-13 19:29:05.472428] Found port = COM7

[2021-10-13 19:29:05.645826] Device hw code: 0x690 [2021-10-13 19:29:05.645826] Device hw sub code: 0x8a00 [2021-10-13 19:29:05.645826] Device hw version: 0xca01 [2021-10-13 19:29:05.645826] Device sw version: 0x1 [2021-10-13 19:29:05.655860] Device secure boot: False [2021-10-13 19:29:05.655860] Device serial link authorization: False [2021-10-13 19:29:05.655860] Device download agent authorization: False

[2021-10-13 19:29:05.655860] Disabling watchdog timer [2021-10-13 19:29:05.655860] Insecure device, sending payload using send_da [2021-10-13 19:29:05.716176] Found send_dword, dumping bootrom to bootrom_690.bin PS C:\bypass_utility-v.1.4.2>

AndrewChqng commented 2 years ago

Same here

PS D:\Downloads\exploits_collection-master> python main.py
[2022-03-02 22:00:40.154130] Waiting for device
[2022-03-02 22:00:40.156140] Found device = 0e8d:0003

[2022-03-02 22:00:40.508556] Device hw code: 0x326
[bootrom_326.zip](https://github.com/MTK-bypass/bypass_utility/files/8173244/bootrom_326.zip)

[2022-03-02 22:00:40.508556] Device hw sub code: 0x8a00
[2022-03-02 22:00:40.509564] Device hw version: 0xcb00
[2022-03-02 22:00:40.509564] Device sw version: 0x1
[2022-03-02 22:00:40.510581] Device secure boot: False
[2022-03-02 22:00:40.510581] Device serial link authorization: False
[2022-03-02 22:00:40.511581] Device download agent authorization: False

[2022-03-02 22:00:40.512576] Disabling watchdog timer
[2022-03-02 22:00:40.515280] Insecure device, sending payload using send_da
[2022-03-02 22:00:40.539454] Found send_dword, dumping bootrom to bootrom_326.bin

It's got an M6750T if that's any use

sebastian649 commented 2 years ago

Yo Tambien Tengo Un Alcatel 9013A Que No Me Deja Hacer Nada Con La Seguridad Del Dispositivo Lo Quiero Rootear

ghost commented 2 years ago

I have been able to solve the issue without bypass utility

honjiidar commented 2 years ago

Hi, how did you get it fixed?

ouaheb commented 2 years ago

Hi, how did you get it fixed?

ouaheb commented 2 years ago

Hi, how did you get it fixed? Help me!!

R9TRH commented 8 months ago

How you fixed????