La visita de invitados es limitada
Instala la aplicación
How to install the app on iOS

Follow along with the video below to see how to install our site as a web app on your home screen.

Nota: This feature may not be available in some browsers.

  • ⚠ Queda Prohibido comentario que no aporten nada a los temas como por ejemplo me quedo full sin pegar registro ni nada o comentario que solo contaminan los tema haga comentario de interes comentario que encuentre que no tienen sentido comentario borrado⚡
  • ⚠️ frp cuenga google nvdata combination todo lo que necesites Hostingunlock firmware rom sboot ⚠️
  • ⚠️ Por favor leer el Reglamento para evitar sanciones e inconvenientes con la página⚠️
  • ⚠ No está permitido decir GRACIAS en los temas; no contamine los temas con gracias y gracias; si no hace toma en cuenta estas reglas, su cuenta será suspendida por un mes.⚠️
  • ⚠️ si quiere descargar alguna archivo leea la seccion de tutoriales⚠️

📶Imei/F4 hacer f4 imei reparar OPPO CPH2273 (OPPO A54s) con pandora box

Procesos y métodos para reparar o restaurar el IMEI en dispositivos móviles. Incluye solución de errores F4 y procedimientos con herramientas técnicas.

servergsm

Heròico
Staff Miembro
Administrador
Moderador
Usuario VIP
Online
Reparación de IMEI en OPPO CPH2273 (OPPO A54s) mediante el uso de Pandora Box

REPAIR IMEI SUCESSFULL WITH V6.5 OPPO CPH2273 (OPPO A54s)
HERE THE LOGS
Selected model: OPPO CPH2273 (OPPO A54s)
Operation: Repair
Software version: 6.4

Connect Type-C to NONE... OK
Host Power Off... OK
Connect phone to [PC] in BROM Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM44 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM44 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xE4518633, 0xBA1C658E, 0xA321BBC9, 0xAC77849E
Get Chip ID... [MT6765]
Get SOC ID... [7B01727DB80640884447D13D07B485692BD9FDEC0CE448918D 36D192C82ED52B]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [7]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x13014E47314A395339101AD40D2319A3
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: G1J9S9
EMMC_ID : 0x13014E47314A395339101AD40D2319A3
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x1D1F000000 (116.48Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : alps
Product Manufacturer : alps
Product Model : CPH2273
Product Name : vnd_oppo6765
Product Device : oppo6765
Product Board : oppo6765
Board Platform : mt6765
Build ID : RP1A.200720.011
Build Date : Wed Nov 24 02:12:03 CST 2021
Display ID : CPH2273_11_A.01
Security Patch : 2021-11-05
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 1637690366587
Read security partition from phone...
Decrypting security data... OK
Encrypt security data... OK
Read partition "nvdata"... OK
Read partition "protect1"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Read security files... OK
Calculating... OK
Repairing IMEI...
IMEI: 8603140503,,,,,
Write IMEI and patch CERT [NVDATA]... OK
Checking patch type... [1]
Patching CERT...
Exception: Access violation at address 017603D3 in module PandoraTool.exe. Read of address E2EC0010

v6.5 done patching

Selected model: OPPO CPH2273 (OPPO A54s)
Operation: Repair
Software version: 6.5

Connect Type-C to NONE... OK
Host Power Off... OK
Connect phone to [PC] in BROM Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM36 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM36 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xE4518633, 0xBA1C658E, 0xA321BBC9, 0xAC77849E
Get Chip ID... [MT6765]
Get SOC ID... [7B01727DB80640884447D13D07B485692BD9FDEC0CE448918D 36D192C82ED52B]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [7]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x13014E47314A395339101AD40D2319A3
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: G1J9S9
EMMC_ID : 0x13014E47314A395339101AD40D2319A3
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x1D1F000000 (116.48Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : alps
Product Manufacturer : alps
Product Model : CPH2273
Product Name : vnd_oppo6765
Product Device : oppo6765
Product Board : oppo6765
Board Platform : mt6765
Build ID : RP1A.200720.011
Build Date : Wed Nov 24 02:12:03 CST 2021
Display ID : CPH2273_11_A.01
Security Patch : 2021-11-05
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 1637690366587
Read security partition from phone...
Decrypting security data... OK
Encrypt security data... OK
Read partition "nvdata"... OK
Read partition "protect1"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Read security files... OK
Calculating... OK
Repairing IMEI...
IMEI: 860314050//;;;;
Write IMEI and patch CERT [NVDATA]... OK
Checking patch type... [1]
Patching CERT... OK
Save patched partiton... OK
Updating NVRAM... OK
Read security partition from phone... OK
Write security partition to phone... OK
Checking additional lock... [ENABLED]
Disable additional lock... OK
Unlock bootloader done!
Selected "Disable VBMETA verification"
Read security partition from phone... OK
Write security partition to phone... OK
Write IMEI and patch CERT [NVRAM]... OK
Write partition "nvdata"... OK
Write partition "nvram"... OK
Repair Security and Patch cert done!
If your phone after repair keeps rebooting - use wipe data option.

reset sucessfully
Selected model: OPPO CPH2273 (OPPO A54s)
Operation: Erase FRP And Wipe
Software version: 6.5
Erasing of partitions can damage your device.
Make sure that you have a backup created. Continue? YES

Connect Type-C to NONE... OK
Host Power Off... OK
Connect phone to [PC] in BROM Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM36 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM36 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xE4518633, 0xBA1C658E, 0xA321BBC9, 0xAC77849E
Get Chip ID... [MT6765]
Get SOC ID... [7B01727DB80640884447D13D07B485692BD9FDEC0CE448918D 36D192C82ED52B]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [7]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x13014E47314A395339101AD40D2319A3
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: G1J9S9
EMMC_ID : 0x13014E47314A395339101AD40D2319A3
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x1D1F000000 (116.48Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : alps
Product Manufacturer : alps
Product Model : CPH2273
Product Name : vnd_oppo6765
Product Device : oppo6765
Product Board : oppo6765
Board Platform : mt6765
Build ID : RP1A.200720.011
Build Date : Wed Nov 24 02:12:03 CST 2021
Display ID : CPH2273_11_A.01
Security Patch : 2021-11-05
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 1637690366587
Read partition "frp"... OK
Backup saved to C:/Program%20Files%20(x86)/Z3X/Pandora/Backup/MTK/OPPO_CPH2273%20(OPPO%20A54s)/FRP_BACKUP_(2024-3-6_11-49-35)/
Writting FRP data... OK
Formatting "userdata" partition... OK
Formatting "cache" partition... OK
Formatting "metadata" partition... OK
Formatting "md_udc" partition... OK
Wipe data done!
 

Crea una cuenta o inicia sesión para comentar

Debes ser miembro para poder dejar un comentario.

Crear una cuenta

Crea una cuenta en nuestra comunidad. ¡Es muy fácil!

Acceso

¿Ya tienes una cuenta? Inicia sesión aquí.

Usuarios que están viendo este hilo.

Hilos similares

Respuestas
0
Visitas
79
Respuestas
0
Visitas
55
Respuestas
0
Visitas
101
Respuestas
0
Visitas
187
Respuestas
0
Visitas
207
Respuestas
0
Visitas
165
Respuestas
0
Visitas
219
Respuestas
0
Visitas
243
Atrás
Arriba