Online
		Oppo Reno 5 Lite Unlock Con Pandora
 oppo reno 5 lite con parche de seguridad
5 abril 2024 android 13
abrir pandora
seleccionar modelo y unlock directo
telefono apagado apretar vol mas y vol menos y menosde 1 min se libera
Selected model: OPPO CPH2205 (OPPO Reno5 Lite)
Operation: Unlock network
Software version: 6.10
Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to [BOX] in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM342 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0725
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6779]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Waiting for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0725
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6779]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Release testpoint
Advanced Bypass Security... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM342 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0725
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6779]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x644C04DB, 0x4099443A, 0xDB54305A, 0x3CF89976
Get Chip ID... [MT6779]
Get SOC ID... [14122EB4060556D915070556E7833AF4E215DB728449AF35C88EF543790B80A9]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [10]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): H9HQ15AECMBDAR (A043)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : H9HQ15AECMBDAR
UFS_FWVER : A043
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
RAM INFO:
INT_SRAM: 0x0000080000 (512.00Kb)
EXT_RAM : 0x0180000000 (6.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EROFS] ... OK
Product Brand : OPPO
Product Manufacturer : OPPO
Product Model : CPH2205
Product Name : CPH2205
Product Device : OP4F43L1
Product Board : k79v1_64
Board Platform : mt6779
Build ID : TP1A.220905.001
Build Date : Mon Apr 22 11:09:53 CST 2024
Display ID : CPH2205_11_F.62
Security Patch : 2024-04-05
Version Release : 13
Firmware Version : R.178ac98+3067f
Userdata FS Type : EXT4
Read security partition from phone... OK
Read security files... OK
Read NVDATA files... OK
Calculating... OK
Read lock info... OK
Read partition "nvdata"... OK
Read partition "protect1"... OK
Read security files... OK
Read NVDATA files... OK
Read IMEI... OK
Unlock... OK [DF1, DF2, GB1, GB2, OPL]
Write lock info... OK
Write security partition to phone... OK
Network Unlock done!