Oppo F19s (cph2223) FRP Erase By Cheetah Tool Pro
Code:
Waiting for device...
Download port: Qualcomm HS-USB QDLoader 9008 (COM16)
Connect to Device... Okay
Handshaking... Okay
Connected device:
Brand : Oppo
Model : f19s (cph2223)
Identify Device...
Serial: 0x7da15e8d Hw ID: 0x14d0e1 Sbl: 0x0001 Vendor: Oppo/Oneplus/Realme
Pk hash: 0x49445e14621312dfeccd4389f267e6b71674ddd36b1bc41d1f605aa991d14ad6
[QCOM] Preparing exploit path
PREPARE EXPLOIT LOADER
Sending Loader... Okay
Authorizing device... Okay
Checking Response... Okay
Retriving storage info... Okay
Setuping up device... Okay
Device information
[B][COLOR="Yellow"] Brand: OPPO
Model: CPH2223
Product: CPH2223
Vendor Name: Bengal for arm64
Manufacturer: OPPO
Platform: bengal
Android Version: 13
Security Patched: 2025-01-01
Build ID: TP1A.220905.001
Display ID: CPH2223_11_F.83
Build Date: Thu Jan 2 15:59:39 CST 2025
Build: R.1bd10d0-48839-48838
OTA Version: CPH2223_11.A.01_001_202412170443[/COLOR][/B]
Storage info
Size : 107.92 GB
FS Type : F2FS
Crypto Type : AES-256-XTS:AES-256-CTS:V2+INLINECRYPT_OPTIMIZED+WRAPPEDKEY_V0
Reading misc... Okay
Writing script to misc...
Rebooting device

