Z3X VIVO V23 5G PD 2167BF REPAIR IMEI BY PANDORA BOX NEW SECURITY

Z3X Team

RAHIM TECH BD

Active Member
Selected model: Vivo PD2167BF (Vivo V23 5G)
Operation: Repair IMG_20230619_160217.jpg
Software version: 5.1

Connect Type-C to NONE... OK
Host Power Off... OK
Connect phone to [PC] in BROM Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0]
Device found at COM10 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0959
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6877]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0]
Device found at COM10 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0959
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6877]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xC2670758, 0x83ADCA1E, 0xDB488B4E, 0xE895CA8C
Get Chip ID... [MT6877]
Get SOC ID... [D08B9696B7D0C636A8C569BBC027B4229A2153CFB1E4AC7AE7BCF956ECE189C4]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [17]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): KM8V9001JM-B813 (0600)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : KM8V9001JM-B813
UFS_FWVER : 0600
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0200000000 (8.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : vivo
Product Manufacturer : vivo
Product Model : V2130
Product Name : 2130
Product Device : 2130
Product Board : k6877v1_64_k419
Board Platform : MTK6877
Build ID : TP1A.220624.014
Build Date : Sat May 6 16:22:45 CST 2023
Display ID : Funtouch OS 13 Global
Security Patch : 2023-05-01
Version SDK : 33
Version Release : 13
Version Codename : REL
Firmware Version : 13.1.15.14.W20
Userdata FS Type : F2FS
Reading security from phone... OK
IMEI 1: 863xxxxxxxxxxxx
IMEI 2: 863xxxxxxxxxxxx
Set new IMEI to:
IMEI 1: 354445764xxxxxx
IMEI 2: 354445764xxxxxx
Searching security key... found! [3]
Writing security to phone... OK
Repair Security done!
 

Attachments

  • IMG_20230619_160206.jpg
    IMG_20230619_160206.jpg
    102.4 KB · Views: 47
  • Like
Reactions: Chinnappadoss

Chinnappadoss

Active Member
Nov 9, 2020
30
10
India
Selected model: Vivo PD2167BF (Vivo V23 5G)
Operation: Repair View attachment 56453
Software version: 5.1

Connect Type-C to NONE... OK
Host Power Off... OK
Connect phone to [PC] in BROM Mode
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0]
Device found at COM10 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0959
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6877]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Release testpoint, waiting 2 seconds
Advanced Bypass Security... OK
Waiting for device... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port_V1633,usb2ser.sys,3.0.1504.0]
Device found at COM10 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0959
Get sec config... OK [000000E0]
Active sec flags: []
Get HW & SW version from device... OK
HW VER: CA00, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6877]
LibUSB installed
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0xC2670758, 0x83ADCA1E, 0xDB488B4E, 0xE895CA8C
Get Chip ID... [MT6877]
Get SOC ID... [D08B9696B7D0C636A8C569BBC027B4229A2153CFB1E4AC7AE7BCF956ECE189C4]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [17]
Send preloader... OK
Start preloader... OK
Checking preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): KM8V9001JM-B813 (0600)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : KM8V9001JM-B813
UFS_FWVER : 0600
BLOCK_SIZE: 0x0000001000 (4.00Kb)
UFS_LU0 : 0x0000400000 (4.00Mb)
UFS_LU1 : 0x0000400000 (4.00Mb)
UFS_LU2 : 0x1DCB000000 (119.17Gb)
RAM INFO:
INT_SRAM: 0x0000070000 (448.00Kb)
EXT_RAM : 0x0200000000 (8.00Gb)
Checking USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Checking A/B state... OK
Read product info... [EXT4] ... OK
Product Brand : vivo
Product Manufacturer : vivo
Product Model : V2130
Product Name : 2130
Product Device : 2130
Product Board : k6877v1_64_k419
Board Platform : MTK6877
Build ID : TP1A.220624.014
Build Date : Sat May 6 16:22:45 CST 2023
Display ID : Funtouch OS 13 Global
Security Patch : 2023-05-01
Version SDK : 33
Version Release : 13
Version Codename : REL
Firmware Version : 13.1.15.14.W20
Userdata FS Type : F2FS
Reading security from phone... OK
IMEI 1: 863xxxxxxxxxxxx
IMEI 2: 863xxxxxxxxxxxx
Set new IMEI to:
IMEI 1: 354445764xxxxxx
IMEI 2: 354445764xxxxxx
Searching security key... found! [3]
Writing security to phone... OK
Repair Security done!
PLEASE UPLOAD WORKING TESTPOINT FOR THIS MODEL
 
Top