Oppo A54 CPH2239 FRP NCK New Sec 5 Feb. 2023 Success
Oppo V1 Exploit
Oppo V1 Exploit
Code:
[Reset FRP]
Waiting for device...Found
Port Info : MediaTek PreLoader USB VCOM_V2023 (Android) (COM97) [\\?\usb#vid_22d9&pid_0006#5&c39147&0&5#{86e0d1e0-8089-11d0-9ce4-08003e301f73}]
: MediaTek Inc., 3.0.1512.0 [usb2ser_mtk.sys]
: PRELOADER PORT
CUST_DA : INT:OPPO V1
HW ID : MT6765 [0766] Helio P35/G35
HW VER : 8A00,CA00,0000
Sec. Cfg : [SBA Active] [SLA Inactive] [DAA Active]
MEID : A0FAE35156E0213F5629FE291E7BF39B
SoC ID[0] : 798A00594944EC67C6D6884DCF3909CA
SoC ID[1] : 89F8C958AF8DED96FB8FC293CD9C967A
Sending DA1...Done
Running DA1...Done
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection : preloader
Speed : high-speed
Running Exploit (Old)...Done
Sending DA2...OK
Activating DA Extension...Done
HRID : A1A3FFE8FD054136B37110333A2CE947
SRAM : 0x0000000000038000 [224.00 KB]
DRAM : 0x0000000100000000 [4.00 GB]
EMMC ID : G1J9R8
EMMC CID : 13014E47314A3952381011B438E03809
BOOT[1] : 0x0000000000400000 [4.00 MB]
BOOT[2] : 0x0000000000400000 [4.00 MB]
RPMB : 0x0000000001000000 [16.00 MB]
USERAREA : 0x0000000E8F800000 [58.24 GB]
Reading Parititon Info...OK
Reset FRP Data...Done
Process finished
[NCK MTK Exploit Tool v1.3]
LOG TXT : 20250217_154445.txt
