TomKing062 / CVE-2022-38694_unlock_bootloader

This is a one-time signature verification bypass. For persistent signature verification bypass, check https://github.com/TomKing062/CVE-2022-38691_38692
284 stars 40 forks source link

Alldocube iPlay50 Mini(T811) #37

Closed desugar-64 closed 10 months ago

desugar-64 commented 10 months ago

I used your ums9230_alldocube50mini unlocking tool to unlock the bootloader on my Alldocube iPlay 50 mini (T811) tablet. It kind of worked - during boot up there is now a warning message about the device being unlocked, and the tablet itself still functions properly. However, when I put the tablet into bootloader mode, I am unable to flash a new vbmeta image. The writing process just hangs and does nothing.

I also tried installing the AOSP 13/14 GSI using the DSU and Shizuku/ADB tools. The installation process reported completing successfully, but after rebooting, the tablet fails to load the B system partition and instead falls back to the A partition. During boot up, I see a black screen before the tablet reboots back into the original stock firmware.

This makes me think that maybe the bootloader is not fully unlocked, if that is possible.

desugar-64 commented 10 months ago

nvm...

Fyramiz commented 5 months ago
Fyramiz commented 5 months ago

And don't use DSU with unisoc