when i enter this command "python mtk e metadata,userdata,md_udc" and i enter brom mode it shows it :
MTK Flash/Exploit Client V1.52 (c) B.Kerler 2018-2021
Preloader - Status: Waiting for PreLoader VCOM, please connect mobile
Port - Hint:
Power off the phone before connecting.
For brom mode, press and hold vol up, vol dwn, or all hw buttons and connect usb.
For preloader mode, don't press any hw button and connect usb.
...Port - Device detected

Preloader - CPU: MT6781(Helio A22)
Preloader - HW version: 0x0
Preloader - WDT: 0x10007000
Preloader - Uart: 0x11002000
Preloader - Brom payload addr: 0x100a00
Preloader - DA payload addr: 0x200000
Preloader - Var1: 0xa
Preloader - Disabling Watchdog...
Preloader - HW code: 0x1066
Preloader - Target config: 0xe5
Preloader - SBC enabled: True
Preloader - SLA enabled: False
Preloader - DAA enabled: True
Preloader - SWJTAG enabled: True
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False
Preloader - Root cert required: False
Preloader - Mem read auth: True
Preloader - Mem write auth: True
Preloader - Cmd 0xC8 blocked: True
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xca00
Preloader - SW Ver: 0x0
Preloader - ME_ID: B192BEE94D9B21021966AF44D1AEFC09
PLTools - Loading payload from generic_patcher_payload.bin, 0x568 bytes
PLTools - Kamakiri / DA Run
Kamakiri - Trying kamakiri2..
Traceback (most recent call last):
File "C:\Users\Kany2\Pictures\Realme 8i\mtkclient-main\mtk", line 1843, in <module>
mtk = Main(args).run()
File "C:\Users\Kany2\Pictures\Realme 8i\mtkclient-main\mtk", line 649, in run
mtk = mtk.bypass_security()
File "C:\Users\Kany2\Pictures\Realme 8i\mtkclient-main\mtk", line 239, in bypass_security
if plt.runpayload(filename=self.config.payloadfile):
File "C:\Users\Kany2\Pictures\Realme 8i\mtkclient-main\mtkclient\Library\pltools.py", line 100, in runpayload
if self.kama.payload(payload, addr, True, exploittype):
File "C:\Users\Kany2\Pictures\Realme 8i\mtkclient-main\mtkclient\Library\kamakiri.py", line 134, in payload
if self.exploit2(payload, addr):
File "C:\Users\Kany2\Pictures\Realme 8i\mtkclient-main\mtkclient\Library\kamakiri.py", line 113, in exploit2
ptr_send = unpack("<I", self.da_read(self.mtk.config.chipconfig.send_ptr[0][1], 4))[0] + 8
TypeError: 'NoneType' object is not subscriptable