Closed ghost closed 2 years ago
Same here
PS D:\Downloads\exploits_collection-master> python main.py
[2022-03-02 22:00:40.154130] Waiting for device
[2022-03-02 22:00:40.156140] Found device = 0e8d:0003
[2022-03-02 22:00:40.508556] Device hw code: 0x326
[bootrom_326.zip](https://github.com/MTK-bypass/bypass_utility/files/8173244/bootrom_326.zip)
[2022-03-02 22:00:40.508556] Device hw sub code: 0x8a00
[2022-03-02 22:00:40.509564] Device hw version: 0xcb00
[2022-03-02 22:00:40.509564] Device sw version: 0x1
[2022-03-02 22:00:40.510581] Device secure boot: False
[2022-03-02 22:00:40.510581] Device serial link authorization: False
[2022-03-02 22:00:40.511581] Device download agent authorization: False
[2022-03-02 22:00:40.512576] Disabling watchdog timer
[2022-03-02 22:00:40.515280] Insecure device, sending payload using send_da
[2022-03-02 22:00:40.539454] Found send_dword, dumping bootrom to bootrom_326.bin
It's got an M6750T if that's any use
Yo Tambien Tengo Un Alcatel 9013A Que No Me Deja Hacer Nada Con La Seguridad Del Dispositivo Lo Quiero Rootear
I have been able to solve the issue without bypass utility
Hi, how did you get it fixed?
Hi, how did you get it fixed?
Hi, how did you get it fixed? Help me!!
How you fixed????
Hello, I have a problem when I want to bypass my Umidigi A5 Pro. I wanted to flash the phone, something went wrong and the preloader crashed. What exactly do I have to do? Please help!
PS C:\bypass_utility-v.1.4.2> python main.py [2021-10-13 19:28:48.506446] Waiting for device [2021-10-13 19:29:05.472428] Found port = COM7
[2021-10-13 19:29:05.645826] Device hw code: 0x690 [2021-10-13 19:29:05.645826] Device hw sub code: 0x8a00 [2021-10-13 19:29:05.645826] Device hw version: 0xca01 [2021-10-13 19:29:05.645826] Device sw version: 0x1 [2021-10-13 19:29:05.655860] Device secure boot: False [2021-10-13 19:29:05.655860] Device serial link authorization: False [2021-10-13 19:29:05.655860] Device download agent authorization: False
[2021-10-13 19:29:05.655860] Disabling watchdog timer [2021-10-13 19:29:05.655860] Insecure device, sending payload using send_da [2021-10-13 19:29:05.716176] Found send_dword, dumping bootrom to bootrom_690.bin PS C:\bypass_utility-v.1.4.2>