Open Mr4ucker opened 2 years ago
D:\mtkclient\bypass>python main.py [2022-03-13 02:34:42.685510] Waiting for device [2022-03-13 02:34:48.955530] Found device = 0e8d:0003
[2022-03-13 02:34:49.375418] Device hw code: 0x717 [2022-03-13 02:34:49.375418] Device hw sub code: 0x8a00 [2022-03-13 02:34:49.375418] Device hw version: 0xca01 [2022-03-13 02:34:49.375418] Device sw version: 0x200 [2022-03-13 02:34:49.375418] Device secure boot: False [2022-03-13 02:34:49.375418] Device serial link authorization: False [2022-03-13 02:34:49.375418] Device download agent authorization: False
[2022-03-13 02:34:49.375418] Disabling watchdog timer [2022-03-13 02:34:49.385457] Insecure device, sending payload using send_da [2022-03-13 02:34:49.435554] Found send_dword, dumping bootrom to bootrom_717.bin
D:\mtkclient\bypass>python main.py [2022-03-13 02:34:42.685510] Waiting for device [2022-03-13 02:34:48.955530] Found device = 0e8d:0003
[2022-03-13 02:34:49.375418] Device hw code: 0x717 [2022-03-13 02:34:49.375418] Device hw sub code: 0x8a00 [2022-03-13 02:34:49.375418] Device hw version: 0xca01 [2022-03-13 02:34:49.375418] Device sw version: 0x200 [2022-03-13 02:34:49.375418] Device secure boot: False [2022-03-13 02:34:49.375418] Device serial link authorization: False [2022-03-13 02:34:49.375418] Device download agent authorization: False
[2022-03-13 02:34:49.375418] Disabling watchdog timer [2022-03-13 02:34:49.385457] Insecure device, sending payload using send_da [2022-03-13 02:34:49.435554] Found send_dword, dumping bootrom to bootrom_717.bin
Maybe there is some way to replace "bootrom.bin" with another one, already unlocked?
Or is there a way to bypass the protection?