Thanks to:
chaosmaster / k4y0z: GitHub / XDA
xyzz / xyz`: GitHub / XDA
Dinolek: GitHub / XDA
1. Download the attached file:
VD171_MTK-bypass.zip.
2. Extract the file and open the folder.
3. Run and install python:
python-3.9.1-amd64.exe.
Keep atention: You need to select "
Add Python to PATH" before starting the installation.
4. Open cmd or powershell and execute this command:
pip install pyusb pyserial json5
5. Go to the
Driver folder and right-click on the
cdc-acm.inf file, then click Install and then, close window.
6. Run and install filter wizard:
libusb-win32-devel-filter-1.2.6.0.exe.
7. Launch filter wizard.
8. Select
Install a device filter and click Next.
9. Connect powered off phone with volume- button to boot in EDL mode.
10. Once you see new
MediaTek USB Port in the list, select it and click Install.
Now, you are ready for bypassing EDL !
1. Go to the
Bypass folder. Run the script:
bypass.bat.
2. Connect powered off phone with volume- button to boot in EDL mode.
3. Once you get "
Protection disabled" at the end,
without disconnecting phone and usb, run SP Flash Tool.
4. Once the SP Flash Tool opens, click Options > Options > Connection.
5. Select
UART mode and select
Baud rate to
921600.
Now, you are ready for flashing !
1. Download latest release of the tool:
https://github.com/MTK-bypass/bypass_utility/releases/latest
2. Download latest release of payloads:
https://github.com/MTK-bypass/exploits_collection/releases/latest
3. Extract the content of both files to the
Bypass folder.
Now, you are updated !
- How does the bypass work?
A bricked Xiaomi phone led me to discover a project in Github that uses a MediaTek BootROM exploit that was undocumented. The exploit was found by Xyz, and implemented by Chaosmaster. The initial exploit was already available for quite a while. Since I have managed to revive my phone, I am documenti
tinyhack.com
All Credits To:
chaosmaster / k4y0z: GitHub / XDA
xyzz / xyz`: GitHub / XDA
Dinolek: GitHub / XDA
Do you need help with your MERLIN device ?
Read this FAQ: https://forum.xda-developers.com/t/...for-merlin-redmi-note-9-redmi-10x-4g.4225163/
#NoAuth #NoAuthentication #No-Auth #No-Authentication #MediaTek #Xiaomi
#MiAuth #MiAuthentication #Mi-Auth #Mi-Authentication #XiaoMiAuth #free
#XiaoMiAuthentication #XiaoMi-Auth #XiaoMi-Authentication #unbricking
#unbricked #unbrick
#MTK #MT6572 #MT6735 #MT6737 #MT6739 #MT6750 #MT6765 #MT6762
#MT6761 #MT6768 #MT6771 #MT6785 #MT8127 #MT8163 #MT8173 #MT8695