Z3X Oppo A77 5G CPH2339 imei Repair Done Android 12 2023 Security Patch

Z3X Team

asad76

Friend's Martview
Apr 17, 2020
338
253
US

Oppo A77 5G CPH2339 imei Repair Done Android 12 2023 Security Patch



Selected model: OPPO CPH2083 (OPPO A12)
Operation: Repair
Software version: 5.13
Work ID: 12215341

Connect phone in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0]
Device found at COM21 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0989
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6833]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0]
Device found at COM21 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0989
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6833]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x6EC03C6E, 0x68A719EA, 0x59AFBF09, 0x747DC389
Get Chip ID... [MT6833]
Get SOC ID... [541B0F431956B3D8063DAFCA10AF651454E21B7B22EA040CD0C261B4C5B2E0BF]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [14]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): KM2L9001CM-B518 (0700)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : KM2L9001CM-B518
UFS_FWVER : 0700
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK [A]
Read product info... [EROFS] ... OK
Product Brand : oplus
Product Manufacturer : oplus
Product Model : CPH2339
Product Name : ossi
Product Device : ossi
Product Board : k6833v1_64
Board Platform : mt6833
Build ID : SP1A.210812.016
Build Date : Sat May 7 00:02:14 CST 2022
Display ID : CPH2339_11_A.01
Security Patch : 2022-04-05
Version SDK : 31
Version Release : 12
Version Codename : REL
Firmware Version : 1651853813123
Userdata FS Type : F2FS
Read partition "nvdata"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Repairing IMEI...
IMEI 1: 86****************
IMEI 2: 86****************
Write IMEI and patch CERT [NVDATA]... OK
Checking patch type... [1]
Patching partition... OK
Save patched partiton... OK
Write IMEI and patch CERT [NVRAM]... OK
Write partition "nvdata"... OK
Write partition "nvram"... OK
Repair Security and Patch cert done!
If your phone after repair keeps rebooting - use wipe data option.
 
  • Like
Reactions: FAROK

kammalukhan

Member
Aug 7, 2020
6
3
multan

Oppo A77 5G CPH2339 imei Repair Done Android 12 2023 Security Patch



Selected model: OPPO CPH2083 (OPPO A12)
Operation: Repair
Software version: 5.13
Work ID: 12215341

Connect phone in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0]
Device found at COM21 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0989
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6833]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0]
Device found at COM21 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0989
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6833]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x6EC03C6E, 0x68A719EA, 0x59AFBF09, 0x747DC389
Get Chip ID... [MT6833]
Get SOC ID... [541B0F431956B3D8063DAFCA10AF651454E21B7B22EA040CD0C261B4C5B2E0BF]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [14]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): KM2L9001CM-B518 (0700)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : KM2L9001CM-B518
UFS_FWVER : 0700
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK [A]
Read product info... [EROFS] ... OK
Product Brand : oplus
Product Manufacturer : oplus
Product Model : CPH2339
Product Name : ossi
Product Device : ossi
Product Board : k6833v1_64
Board Platform : mt6833
Build ID : SP1A.210812.016
Build Date : Sat May 7 00:02:14 CST 2022
Display ID : CPH2339_11_A.01
Security Patch : 2022-04-05
Version SDK : 31
Version Release : 12
Version Codename : REL
Firmware Version : 1651853813123
Userdata FS Type : F2FS
Read partition "nvdata"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Repairing IMEI...
IMEI 1: 86****************
IMEI 2: 86****************
Write IMEI and patch CERT [NVDATA]... OK
Checking patch type... [1]
Patching partition... OK
Save patched partiton... OK
Write IMEI and patch CERT [NVRAM]... OK
Write partition "nvdata"... OK
Write partition "nvram"... OK
Repair Security and Patch cert done!
If your phone after repair keeps rebooting - use wipe data option.
fake post not possible
 

shoaibrao

Active Member
Jan 23, 2017
18
5
Okara Pakistan

Oppo A77 5G CPH2339 imei Repair Done Android 12 2023 Security Patch



Selected model: OPPO CPH2083 (OPPO A12)
Operation: Repair
Software version: 5.13
Work ID: 12215341

Connect phone in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0]
Device found at COM21 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0989
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6833]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0]
Device found at COM21 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0989
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6833]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x6EC03C6E, 0x68A719EA, 0x59AFBF09, 0x747DC389
Get Chip ID... [MT6833]
Get SOC ID... [541B0F431956B3D8063DAFCA10AF651454E21B7B22EA040CD0C261B4C5B2E0BF]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [14]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): KM2L9001CM-B518 (0700)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : KM2L9001CM-B518
UFS_FWVER : 0700
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK [A]
Read product info... [EROFS] ... OK
Product Brand : oplus
Product Manufacturer : oplus
Product Model : CPH2339
Product Name : ossi
Product Device : ossi
Product Board : k6833v1_64
Board Platform : mt6833
Build ID : SP1A.210812.016
Build Date : Sat May 7 00:02:14 CST 2022
Display ID : CPH2339_11_A.01
Security Patch : 2022-04-05
Version SDK : 31
Version Release : 12
Version Codename : REL
Firmware Version : 1651853813123
Userdata FS Type : F2FS
Read partition "nvdata"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Repairing IMEI...
IMEI 1: 86****************
IMEI 2: 86****************
Write IMEI and patch CERT [NVDATA]... OK
Checking patch type... [1]
Patching partition... OK
Save patched partiton... OK
Write IMEI and patch CERT [NVRAM]... OK
Write partition "nvdata"... OK
Write partition "nvram"... OK
Repair Security and Patch cert done!
If your phone after repair keeps rebooting - use wipe data option.
Sir Can You Share Dump Please ?
Thanks Anticipation
 
Top