Z3X OPPO CPH2579 OPPO A38 ANDROID 15 IMEI REPAIR DONE SUCCESFULLY Z3X PANDORA(Oppo A38)

Z3X Team

HUSSNAIN SOFTWARE

Active Member
Dec 6, 2023
15
5
Muzzafargarh
OPPO CPH2579 OPPO A38 ANDROID 15 IMEI REPAIR DONE SUCCESFULLY Z3X PANDORA(Oppo A38)
Selected model: OPPO CPH2579 (Oppo A38)
Operation: Repair
Software version: 9.9
Work ID: 96454535

Connect phone in PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1632 (Android),usb2ser.sys,3.0.1504.0]
Device found at COM47 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [00000005]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Preloader exist. Skip connection verification.
Get ME ID... OK
ME_ID = 0x9BA3E6DB, 0x8D4361F3, 0xB1FD78C7, 0x6E3F567C
Load DownloadAgent... OK
Search DA... OK [1]
Send bootloader... error(DA_INIT_KEY_FAIL). Secure DA agent not compatible for this preloader.
Advanced Authorization (Preloader) not supported for this preloader version.


Selected model: OPPO CPH2579 (Oppo A38)
Operation: Repair
Software version: 9.9
Work ID: 96454605

Connect phone in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek PreLoader USB VCOM_V1632 (Android),usb2ser.sys,3.0.1504.0]
Device found at COM0 [PRELOADER]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [00000005]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Read Efuse error
Force switch to BROM... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM6 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Install LibUSB... OK
Waiting for device... OK
Open port... OK
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM6 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0707
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6768]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x9BA3E6DB, 0x8D4361F3, 0xB1FD78C7, 0x6E3F567C
Get Chip ID... [MT6768]
Get SOC ID... [16E674EB3D932000F28629174372F554B69EB5CBC443D4FB7B3D8F2EAD8755F7]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [8]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x15010044525445343203C2D3C0AB5B09
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: DRTE42
EMMC_ID : 0x15010044525445343203C2D3C0AB5B09
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0001000000 (16.00Mb)
EMMC_USER : 0x1D1EC00000 (116.48Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
HEALTH:
Pre EOL Info: normal
DeviceLifeTimeEstA: 0% - 10% device life time used
DeviceLifeTimeEstB: 0% - 10% device life time used
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EROFS] ... OK
Product Brand : OPPO
Product Manufacturer : OPPO
Product Model : CPH2579
Product Name : CPH2579
Product Device : OP5759L1
Product Board : k69v1_64
Board Platform : mt6768
Build ID : AP3A.240617.008
Build Date : Thu Apr 17 17:18:03 CST 2025
Display ID : CPH257922364_15.0.0.702(EX01)
Security Patch : 2025-05-01
Version SDK : 35
Version Release : 15
Version Codename : REL
Firmware Version : T.R4T2.1d74cf6_1
Userdata FS Type : F2FS
Read security partition from phone...
Decrypting security data... OK
Encrypt security data... OK
Read partition "nvdata"... OK
Read partition "protect1"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Read security files... OK
Calculating... OK
Repairing IMEI...
IMEI 1: 8638xxxxxxxxxxxxx
IMEI 2: 8638xxxxxxxxxxxxx
Write IMEI and patch CERT [NVDATA]... OK
Checking patch type... [1]
Patching CERT... OK
Save patched partiton... OK
Updating NVRAM... OK
Read security partition from phone... OK
Write security partition to phone... OK
Checking additional lock... [ENABLED]
Disable additional lock... OK
Unlock bootloader done!
Selected "Disable VBMETA verification"
Read security partition from phone... OK
Write security partition to phone... OK
Write IMEI and patch CERT [NVRAM]... OK
Write partition "nvdata"... OK
Write partition "nvram"... OK
Repair Security and Patch cert done!
If your phone after repair keeps rebooting - use wipe data option.
IMG_20251107_192815.jpg
 
Top