MTK-bypass / exploits_collection

289 stars 100 forks source link

MT6595, Meizu MX4 #23

Closed langyxxl closed 3 years ago

langyxxl commented 3 years ago

python main.py -t -v 0 [2021-05-19 08:40:46.280018] Test mode, testing 0xa... [2021-05-19 08:40:46.280018] Waiting for device [2021-05-19 08:40:51.717110] Found port = COM4 [Errno None] b'libusb0-dll:err [control_msg] sending control message failed, win error: \xd3\xc9\xd3\xda\xcf\xdf\xb3\xcc\xcd\xcb\xb3\xf6\xbb\xf2\xd3\xa6\xd3\xc3\xb3\xcc\xd0\xf2\xc7\xeb\xc7\xf3\xa3\xac\xd2\xd1\xd6\xd0\xd6\xb9 I/O \xb2\xd9\xd7\xf7\xa1\xa3\r\n\n' [2021-05-19 08:40:52.764448] Found send_dword, dumping bootrom to bootrom_6595.bin

bootrom_6595.zip

What should I do after get bootrom, please help

chaosmaster commented 3 years ago

Please test the attached payload.

mt6595_payload.zip

langyxxl commented 3 years ago

It worked. Thank you ^_^ python.exe .\main.py [2021-05-20 10:01:20.468495] Waiting for device [2021-05-20 10:01:25.830493] Found port = COM3

[2021-05-20 10:01:25.871500] Device hw code: 0x6595 [2021-05-20 10:01:25.873500] Device hw sub code: 0x8a00 [2021-05-20 10:01:25.875001] Device hw version: 0xcb00 [2021-05-20 10:01:25.876002] Device sw version: 0x1 [2021-05-20 10:01:25.890500] Device secure boot: True [2021-05-20 10:01:25.891012] Device serial link authorization: True [2021-05-20 10:01:25.892001] Device download agent authorization: True

[2021-05-20 10:01:25.893011] Disabling watchdog timer [2021-05-20 10:01:25.895000] Disabling protection [2021-05-20 10:01:26.120503] Protection disabled