MTK-bypass / bypass_utility

MIT License
459 stars 114 forks source link

What is the problem?! #94

Open DOX007 opened 1 year ago

DOX007 commented 1 year ago

Obviously I'm doing something wrong here?. According to this Exploit, this MT6785 Oukitel WP17 is fully unlocked, and should be flashable:

Windows10: [2022-10-13 02:45:23.376773] Found device = 0e8d:0003 [2022-10-13 02:45:23.766358] Device hw code: 0x813 [2022-10-13 02:45:23.776413] Device hw sub code: 0x8a00 [2022-10-13 02:45:23.786386] Device hw version: 0xca00 [2022-10-13 02:45:23.796588] Device sw version: 0x0 [2022-10-13 02:45:23.806536] Device secure boot: False [2022-10-13 02:45:23.816739] Device serial link authorization: False [2022-10-13 02:45:23.816739] Device download agent authorization: False [2022-10-13 02:45:23.836660] Disabling watchdog timer [2022-10-13 02:45:23.846734] Insecure device, sending payload using send_da [2022-10-13 02:45:23.896695] Found send_dword, dumping bootrom to bootrom_813.bin

Linux: [2022-10-13 09:15:03.350097] Found port = /dev/ttyACM0 [2022-10-13 09:15:03.423994] Device hw code: 0x813 [2022-10-13 09:15:03.425119] Device hw sub code: 0x8a00 [2022-10-13 09:15:03.425523] Device hw version: 0xca00 [2022-10-13 09:15:03.425902] Device sw version: 0x0 [2022-10-13 09:15:03.426248] Device secure boot: False [2022-10-13 09:15:03.426595] Device serial link authorization: False [2022-10-13 09:15:03.426923] Device download agent authorization: False

However, flashing this phone in any Sp flash tool, is ending up in:

ERROR : STATUS_SEC_PUBK_AUTH_MISMATCH_N (0xC002001B)