En esta ocasión vamos a hacer F4 a un Oppo A58 4G con parche de seguridad de 2025-08-01.
Sale con Pandora Box.
Es necesario hacer Test Point.
Seleccionamos el modelo del equipo y nos vamos al apartado IMEI.
Escribimos el imei que queremos que cambie.
Nos aseguramos que este marcada la casilla de Adv. Authorization [BROM]
Damos a reparar y conectamos en el equipo con test point.
El resto lo hace la box.
Es necesario que el bootloader este abierto, así que ténganlo en cuenta.
No olviden hacer respaldo.
LOG
Selected model: OPPO CPH2577 (Oppo A58 4G)
Operation: Repair
Software version: 9.9
Work ID: 95550145
Connect phone in BROM Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1512.0]
You are using driver version 3.0.1512.0, we recommend using version 3.0.1504.0 for proper operation. You can install the correct driver from the program directory.
Device found at COM35 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1512.0]
You are using driver version 3.0.1512.0, we recommend using version 3.0.1504.0 for proper operation. You can install the correct driver from the program directory.
Device found at COM35 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x3C3FF7BF, 0xABFC8DAD, 0x4073D846, 0x30AC4451
Get Chip ID... [MT6768]
Get SOC ID... [FF7890E0776D7E4A8C75914B63FA078D44E8460D7FAA8D072D75907F60390AC9]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [8]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x9B010059305332353600387845841BE9
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: Y0S256
EMMC_ID : 0x9B010059305332353600387845841BE9
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x3A3E000000 (232.97Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
HEALTH:
Pre EOL Info: normal
DeviceLifeTimeEstA: 0% - 10% device life time used
DeviceLifeTimeEstB: 0% - 10% device life time used
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EROFS] ... OK
Product Brand : OPPO
Product Manufacturer : OPPO
Product Model : CPH2577
Product Name : CPH2577
Product Device : OP574FL1
Product Board : k69v1_64
Board Platform : mt6768
Build ID : AP3A.240617.008
Build Date : Mon Aug 4 11:45:44 CST 2025
Display ID : CPH2577_15.0.0.1201(EX01)
Security Patch : 2025-08-01
Version SDK : 35
Version Release : 15
Version Codename : REL
Firmware Version : T.R4T2.1f099a8-39f7e
Userdata FS Type : F2FS
Read security partition from phone...
Decrypting security data... OK
Encrypt security data... OK
Read partition "nvdata"... OK
Read partition "protect1"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Read security files... OK
Calculating... OK
Repairing IMEI...
IMEI: 863957067xxxxxx
Write IMEI and patch CERT [NVDATA]... OK
Checking patch type... [1]
Patching CERT... OK
Save patched partiton... OK
Updating NVRAM... OK
Read security partition from phone... OK
Write security partition to phone... OK
Checking additional lock... [DISABLED]
Unlock bootloader done!
Selected "Disable VBMETA verification"
Read security partition from phone... OK
Write security partition to phone... OK
Write IMEI and patch CERT [NVRAM]... OK
Write partition "nvdata"... OK
Write partition "nvram"... OK
Repair Security and Patch cert done!
If your phone after repair keeps rebooting - use wipe data option.
Por acá Test Point:
Cobren bien.
Sale con Pandora Box.
Es necesario hacer Test Point.
Seleccionamos el modelo del equipo y nos vamos al apartado IMEI.
Escribimos el imei que queremos que cambie.
Nos aseguramos que este marcada la casilla de Adv. Authorization [BROM]
Damos a reparar y conectamos en el equipo con test point.
El resto lo hace la box.
Es necesario que el bootloader este abierto, así que ténganlo en cuenta.
No olviden hacer respaldo.
LOG
Selected model: OPPO CPH2577 (Oppo A58 4G)
Operation: Repair
Software version: 9.9
Work ID: 95550145
Connect phone in BROM Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1512.0]
You are using driver version 3.0.1512.0, we recommend using version 3.0.1504.0 for proper operation. You can install the correct driver from the program directory.
Device found at COM35 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1512.0]
You are using driver version 3.0.1512.0, we recommend using version 3.0.1504.0 for proper operation. You can install the correct driver from the program directory.
Device found at COM35 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x3C3FF7BF, 0xABFC8DAD, 0x4073D846, 0x30AC4451
Get Chip ID... [MT6768]
Get SOC ID... [FF7890E0776D7E4A8C75914B63FA078D44E8460D7FAA8D072D75907F60390AC9]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [8]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x9B010059305332353600387845841BE9
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: Y0S256
EMMC_ID : 0x9B010059305332353600387845841BE9
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x3A3E000000 (232.97Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
HEALTH:
Pre EOL Info: normal
DeviceLifeTimeEstA: 0% - 10% device life time used
DeviceLifeTimeEstB: 0% - 10% device life time used
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EROFS] ... OK
Product Brand : OPPO
Product Manufacturer : OPPO
Product Model : CPH2577
Product Name : CPH2577
Product Device : OP574FL1
Product Board : k69v1_64
Board Platform : mt6768
Build ID : AP3A.240617.008
Build Date : Mon Aug 4 11:45:44 CST 2025
Display ID : CPH2577_15.0.0.1201(EX01)
Security Patch : 2025-08-01
Version SDK : 35
Version Release : 15
Version Codename : REL
Firmware Version : T.R4T2.1f099a8-39f7e
Userdata FS Type : F2FS
Read security partition from phone...
Decrypting security data... OK
Encrypt security data... OK
Read partition "nvdata"... OK
Read partition "protect1"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Read security files... OK
Calculating... OK
Repairing IMEI...
IMEI: 863957067xxxxxx
Write IMEI and patch CERT [NVDATA]... OK
Checking patch type... [1]
Patching CERT... OK
Save patched partiton... OK
Updating NVRAM... OK
Read security partition from phone... OK
Write security partition to phone... OK
Checking additional lock... [DISABLED]
Unlock bootloader done!
Selected "Disable VBMETA verification"
Read security partition from phone... OK
Write security partition to phone... OK
Write IMEI and patch CERT [NVRAM]... OK
Write partition "nvdata"... OK
Write partition "nvram"... OK
Repair Security and Patch cert done!
If your phone after repair keeps rebooting - use wipe data option.
Por acá Test Point:
Debes estar registrado para ver imágenes adjuntar
Cobren bien.
Archivos adjuntos
Debes estar registrado para ver la lista de archivos adjuntos.