January 25, 2022 at 12:35AM : Oppo Reno 5F IMEI Repair (New IMEI) Done by Pandora 2.10 [Done]

Read the steps I Did.
1. Make sure to backup all your important data first, then do IMEI repair. If you face the device bricked caused by latest security then do the next steps.
2. Download this firmware https://androidfilehost.com/?fid=2188818919693789465
3. Flash the firmware using other tool, in my case Unlocktool. Pandora still have bug, not detecting Super.img file. Maybe the developer will fix it soon. after flashing the phone will restart 3 or 4 times, just wait until the phone enter recovery mode itself. then do factory reset.
4. Phone model will change to CPH2285 Model.
5. Open Pandora Tool the choose CPH2285 model, and the last step, do IMEI repair. This will not format the phone. And you are done.

PS: For removing orange state message on boot use unlocktool, the andora box still developing the tool at the moment.

Selected model: OPPO CPH2285 (Oppo F19 Pro)
Operation: Repair
Software version: 2.10

Host Power Off... OK
Switch virtual port to NONE... OK
Connect Type-C to HUB... OK
Host Power On... OK
Connect phone to BOX in BROM/PRELOADER Mode
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM95 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0725
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6779]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Force switch to BROM... OK
Switch virtual port to USB... OK
Connect Type-C to BOX... OK
Host Power On... OK
Wait for device... OK
Read usbhost speed... HIGH
Read Device Descriptor...
Get VID/PID...0E8D/0003
Send start cmd... OK
Get HW code from device... 0725
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6779]
Get sec config... OK [000000E5]
Active sec flags: [SBC DAA]
Advanced Bypass Security... OK
Disconnect virtual port... OK
Connect Type-C to HUB... OK
Wait for device connecting... OK
Driver: [MediaTek Inc.,wdm_usb,MediaTek USB Port,usb2ser.sys,3.0.1504.0]
Device found at COM95 [BROM]
Open port... OK
Send start cmd... OK
Get HW code from device... 0725
Get HW & SW version from device... OK
HW VER: CA01, SW VER: 0000, HW SUB CODE: 8A00
Detect chip [MT6779]
Library Version [2]
Select platform... OK
Init BROM... OK
Force Charge... OK
Disable WatchDog Timer... OK
Reopen port for libver2... OK
Get ME ID... OK
ME_ID = 0x139CF70C, 0xB8865096, 0x5E2DA3E1, 0x9B8971D1
Get Chip ID... [MT6779]
Get SOC ID... [52AAFE712975DAB73ABA18CC5579590119C49414B15574E6B4 7C75A0D0BC1C60]
Get sec config... OK [000000E0]
Load DownloadAgent... OK
Search DA... OK [26]
Send preloader... OK
Start preloader... OK
Check preloader answer... OK
Send bootloader... OK
Start bootloader... OK
Wait for answer from bootloader... OK
Send SYNC signal... OK
Setup device enviroment... OK
Setup device parametres... OK
Receive DA SYNC signal... OK
Set DA parametres... OK
Get device connection agent... [BROM]
Get device info... OK
UFS CID (FW VER): H9HQ15AFAMBDAR (A002)
Load EMI from phone... OK
Parse EMI config... OK
Init EXT RAM... OK
Send 2nd DA... OK
Get device info... OK
UFS INFO:
UFS_CID : H9HQ15AFAMBDAR
UFS_FWVER : A002
BLOCK_SIZE: 0x0000001000 (4,00Kb)
UFS_LU0 : 0x0000400000 (4,00Mb)
UFS_LU1 : 0x0000400000 (4,00Mb)
UFS_LU2 : 0x1DCB000000 (119,17Gb)
RAM INFO:
INT_SRAM: 0x0000080000 (512,00Kb)
EXT_RAM : 0x0200000000 (8,00Gb)
Check USB status... USB_HIGH_SPEED
Read partitions info from phone... OK
Check A/B state... OK
Read product info... OK
Product Brand : alps
Product Manufacturer : alps
Product Model : oplus_mssi_64_cn
Product Name : sys_oplus_mssi_64_cn
Product Device : oplus_mssi_64_cn
Product Board : oppo6779
Board Platform : MT6779
Build ID : RP1A.200720.011
Build Date : Sat Mar 6 10:17:00 CST 2021
Display ID : RP1A.200720.011 release-keys
Security Patch : 2021-03-05
Version SDK : 30
Version Release : 11
Version Codename : REL
Firmware Version : 1614996321774
Read partition "nvdata"... OK
Read partition "nvram"... OK
Read NVDATA files... OK
Read NVRAM files... OK
Read IMEI... OK
IMEI 1: 867711053918599
IMEI 2: 867711053918581
Repairing IMEI...
IMEI 1: 869109055921497
IMEI 2: 869109055921489
Write IMEI [NVDATA]... OK
Load partiton for patching... OK OK
Save patched partiton... OK
Unlock bootloader... OK
Write IMEI [NVRAM]... OK
Write partition "nvdata"... OK
Write partition "nvram"... OK
Repair Security done!




by AWEXSS via GSM-Forum

No comments:

Post a Comment