Z3X Vivo PD1803 (Vivo Y83) SECURITY FIX DONE

Z3X Team

samargsm1

Friend's Martview
Sep 10, 2024
167
683
Pakistan
PayPal:

Donate money to this user
Selected model: Vivo PD1803 (Vivo Y83)
Operation: Repair
Software version: 9.4

Connect Type-C to NONE... OK
Host Power Off... OK
Connect phone to [PC] in BROM/PRELOADER Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM50 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1632,usb2ser.sys,3.0.1504.0]
Device found at COM50 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0766
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6765]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x6208A77B, 0x95F9B6F6, 0xFCCB477D, 0x7306DD16
Get Chip ID... [MT6765]
Get SOC ID... [19F922951127BE9AAF43CFB75D7E71BA6BB5CD761857FF1965F1A780E7108779]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [7]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
EMMC_ID: 0x150100524436344D4201FE0397FA15F7
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
EMMC INFO:
EMMC_CNAME: RD64MB
EMMC_ID : 0x150100524436344D4201FE0397FA15F7
EMMC_BOOT1: 0x0000400000 (4.00Mb)
EMMC_BOOT2: 0x0000400000 (4.00Mb)
EMMC_RPMB : 0x0000400000 (4.00Mb)
EMMC_USER : 0x0747C00000 (29.12Gb)
RAM INFO:
INT_SRAM: 0x000003A000 (232.00Kb)
EXT_RAM : 0x0100000000 (4.00Gb)
HEALTH:
Pre EOL Info: normal
DeviceLifeTimeEstA: 20% - 30% device life time used
DeviceLifeTimeEstB: 20% - 30% device life time used
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : vivo
Product Manufacturer : vivo
Product Model : vivo 1802
Product Name : PD1803BF_EX
Product Device : PD1803BF_EX
Product Board : k62v1_64_bsp
Board Platform : MTK6765
Build ID : O11019
Build Date : 2019年 01月 22日 星期二 21:24:08 HKT
Display ID : O11019 release-keys
Security Patch : 2021-03-01
Version SDK : 27
Version Release : 8.1.0
Version Codename : REL
Firmware Version : 1618387454
Userdata FS Type : EXT4
Read security partition from phone...
Decrypting security data... OK
Encrypt security data... OK
Reading security from phone... OK
IMEI 1: 8680130459xxxxx
IMEI 2: 8680130459xxxxx
Set new IMEI to:
IMEI 1: 35286532xxxxxxx
IMEI 2: 3528653xxxxxxxx
Searching security key... found! [1]
Writing security to phone... OK

Repair Security done!


2025_09_13_13_14_IMG_2582.JPG
 
Top