Hovatek
  • Private Support
  • Blog
  • Home
Login Register Ask Question Hello There, Guest!
Login
Username:
Password: Lost Password?
 

OR

       

Telegram Channel: Join the discussions @ t.me/Hovatek


  1. Hovatek Forum
  2. MOBILE PHONES HELP SECTION
  3. Android
 
Thread Rating:
  • 0 Vote(s) - 0 Average

Thread Modes

MTK erased preloader

Haku
Newbie
Posts: 2
Threads: 1
Joined: Jan 2021
Reputation: 0
#1

06-02-2021, 02:12 PM


I really need some help on this. I damaged my preloader on a BLU Vivo XL4 by running:

fastboot flash preloader preloader_k62v1_64_bsp.bin

Now all i get in SP Flash Tools is STATUS_EXT_RAM_EXCEPTION
Find
Reply
X3non
Hovatek Representative
Posts: 19,049
Threads: 557
Joined: Jul 2014
Reputation: 326
#2

06-02-2021, 06:34 PM
(06-02-2021, 02:12 PM)Haku Wrote:  I really need some help on this. I damaged my preloader on a BLU Vivo XL4 by running:

fastboot flash preloader preloader_k62v1_64_bsp.bin

Now all i get in SP Flash Tools is STATUS_EXT_RAM_EXCEPTION

disconnect / reconnect the battery of the device then retry flashing preloader using sp flash tool
ensure to use the DA for model when flashing, you can download @ https://forum.hovatek.com/thread-26122.html

Note!
We have a reply schedule for Free Support. Please upgrade to Private Support if you can't wait.
Find
Reply
Haku
Newbie
Posts: 2
Threads: 1
Joined: Jan 2021
Reputation: 0
#3

06-02-2021, 09:48 PM
Thanks for the response. The battery is non-removable. I tried those DA files for my device already but I'm getting the same error. Before I bricked it, I managed to unlock the bootloader by running:

fastboot oem unlock

Also when I run the exploit at https://github.com/MTK-bypass/bypass_utility, it gives me following output (so I don't even think I need DA files):

[2021-02-06 12:15:03.622167] Waiting for bootrom
[2021-02-06 12:15:38.508022] Found port = COM7
[2021-02-06 12:15:38.531108] Device hw code: 0x766
[2021-02-06 12:15:38.531608] Device hw sub code: 0x8a00
[2021-02-06 12:15:38.531608] Device hw version: 0xca00
[2021-02-06 12:15:38.531608] Device sw version: 0x0
[2021-02-06 12:15:38.532111] Device secure boot: False
[2021-02-06 12:15:38.532111] Device serial link authorization: False
[2021-02-06 12:15:38.532611] Device download agent authorization: False
[2021-02-06 12:15:38.532611] Disabling watchdog timer
[2021-02-06 12:15:38.533613] Insecure device, sending payload using send_da
[2021-02-06 12:15:38.572376] Found send_dword, dumping bootrom to bootrom_766.bin

My other question is: Can that exploit (bypass_utility) be modified in such a way that it can write back the correct preloader to the device? As it seems to be the only tool that works with it ATM.
Find
Reply
X3non
Hovatek Representative
Posts: 19,049
Threads: 557
Joined: Jul 2014
Reputation: 326
#4

08-02-2021, 09:58 AM
(06-02-2021, 09:48 PM)Haku Wrote:  Thanks for the response. The battery is non-removable. I tried those DA files for my device already but I'm getting the same error. Before I bricked it, I managed to unlock the bootloader by running:

fastboot oem unlock

Also when I run the exploit at https://github.com/MTK-bypass/bypass_utility, it gives me following output (so I don't even think I need DA files):

[2021-02-06 12:15:03.622167] Waiting for bootrom
[2021-02-06 12:15:38.508022] Found port = COM7
[2021-02-06 12:15:38.531108] Device hw code: 0x766
[2021-02-06 12:15:38.531608] Device hw sub code: 0x8a00
[2021-02-06 12:15:38.531608] Device hw version: 0xca00
[2021-02-06 12:15:38.531608] Device sw version: 0x0
[2021-02-06 12:15:38.532111] Device secure boot: False
[2021-02-06 12:15:38.532111] Device serial link authorization: False
[2021-02-06 12:15:38.532611] Device download agent authorization: False
[2021-02-06 12:15:38.532611] Disabling watchdog timer
[2021-02-06 12:15:38.533613] Insecure device, sending payload using send_da
[2021-02-06 12:15:38.572376] Found send_dword, dumping bootrom to bootrom_766.bin

My other question is: Can that exploit (bypass_utility) be modified in such a way that it can write back the correct preloader to the device? As it seems to be the only tool that works with it ATM.

you'd need to disassemble the back to get to the battery clip, after disconnecting / reconnecting the battery then retry both methods
btw it's already known that xl4 has secure boot unless yours is a clone? try the battery disconnection and ensure you are using stock firmware for the xl4 model

the bypass_ultility is only meant to remove protection not to flash the device, to flash you need spft with connection settings set to use UART with highest baudrate speed

Note!
We have a reply schedule for Free Support. Please upgrade to Private Support if you can't wait.
(This post was last modified: 08-02-2021, 09:59 AM by X3non.)
Find
Reply
« Next Oldest | Next Newest »


Possibly Related Threads…
Thread / Author Replies Views Last Post
MTK Preloader disconnecting after a few seconds
hoimoiboi
23
2,435
Last Post by X3non
02-05-2020, 11:44 AM
I erased my system.img while trying to flash evolution x on my infinix x652a
Drak
1
521
Last Post by X3non
13-02-2020, 09:15 AM
Tecno C9 Info read... Erased/damaged phone?
ahmadmofadal
9
2,410
Last Post by X3non
17-04-2019, 10:38 AM
mtk adb preloader backup command
seci20
4
3,963
Last Post by seci20
22-01-2017, 12:46 AM
homtom ht7 mtk preloader
inaolaji92
21
9,854
Last Post by mensa
08-07-2016, 03:42 PM

  • View a Printable Version


Users browsing this thread: 1 Guest(s)
  1. Hovatek Forum
  2. MOBILE PHONES HELP SECTION
  3. Android

About

The Hovatek Forum is a free Tech. Support Forum. We provide solutions to all your device related problems and questions. We'll love to have you participate in discussions here whether you're a Newbie or Experienced.

         

Forum Team

Powered By MyBB. Crafted by EreeCorp.




Linear Mode
Threaded Mode

Share

Share Tweet Share Share Pin