Z3X Oppo F5_CPH1723 Dual Imei Repair Pandora Box

Z3X Team

Yeminoo

Friend's Martview
Sep 13, 2019
667
522
Myawaddy

Oppo F5_CPH1723 Dual Imei Repair Pandora Box


Selected model: OPPO CPH1723 (OPPO F5)
Operation: Repair
Software version: 5.12

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to [BOX] in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM10 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0690
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0001, HW SUB CODE: 8A00
Detect chip [MT6763]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Host Power Off... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Waiting for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0690
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0001, HW SUB CODE: 8A00
Detect chip [MT6763]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Release testpoint
Advanced Bypass Security... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM10 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0690
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0001, HW SUB CODE: 8A00
Detect chip [MT6763]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xDFC4835A, 0x971FCB27, 0x809DD3C3, 0x9A46525D
Get Chip ID... [MT6763]
Get SOC ID... [CC7C0C73A9EBF8812F4814207D7AEB72BE7F4CAAA61F1A7AB4E53613B7D8D94E]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [6]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x150100525836344D42035B879746C46D
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: RX64MB
EMMC_ID : 0x150100525836344D42035B879746C46D
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x0747C00000 (29.12Gb)
RAM INFO:
INT_SRAM: 0x0000040000 (256.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read partition "nvdata"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Repairing IMEI...
IMEI 1: 862481290145951
IMEI 2: 862481290145969
Write IMEI and patch CERT [NVDATA]... OK
Checking patch type... [1]
Patching partition... OK
Save patched partiton... OK
Selected "Auto unlock bootloader"
Read security partition from phone... OK
Decrypting security data... OK
Encrypt security data... OK
Write security partition to phone... OK
Checking additional lock... [WRONG DATA, SKIP]
Write IMEI and patch CERT [NVRAM]... OK
Write partition "nvdata"... OK
Write partition "nvram"... OK
Repair Security and Patch cert done!
If your phone after repair keeps rebooting - use wipe data option.

f5.png
 
Top