how can I flash stock_rom without usb debug enabled ? adb fastboot not recognize device

Search This thread

matteo555

Member
Jun 22, 2022
47
5
Hi I've an issue, I have the fire stick tv (sheldon - 3°rd gen) freezed (not power on), and I wanted to fix it with trying flash the stock rom.
When I do connecto to PC and run 'adb devices' command I receive nothing (via linux terminal), with 'lsusb' same problem, this because is never being enabled usb debug and now the fire stick is freezed and cannot be possible to access into settings.
I received some information of device with 'dmesg | grep usb' and here I get info about id-vendor (0e8d) id-product (2000) and manifacturer (MediaTek MT65xx).
Is there a way to flash the stock rom to fire stick tv without adb or fastboot or whatever ?

Thanks
 
Last edited:

Finnzz

Senior Member
Sep 26, 2017
378
194
If the Stick firmware is older than PS7273 then you can use this method to reflash it through TWRP or fastboot.

If it's on newer firmware, then there is currently no way to reflash it or to make an unauthorized ADB connection.

You can try booting the stick in safe mode.

Amazon will replace it for free if it's within it's 1 year warranty.
 
Last edited:

matteo555

Member
Jun 22, 2022
47
5
ur hel
If the Stick firmware is older than PS7273 then you can use this method to reflash it through TWRP or fastboot.

If it's on newer firmware, then there is currently no way to reflash it or to make an unauthorized ADB connection.

You can try booting the stick in safe mode.

Amazon will replace it for free if it's within it's 1 year warranty.
very nice ur support, thanks !
unfortunately I get this issue :
Code:
Serial protocol mismatch, expected 0000 got 2001
tried several time and no signs of improvement, searching for fix, any help ?
 

matteo555

Member
Jun 22, 2022
47
5
Code:
[2023-02-09 11:30:34.244235] Waiting for device
[2023-02-09 11:30:55.326882] Found port = /dev/ttyACM0
[2023-02-09 11:30:55.365906] Handshake
[2023-02-09 11:30:55.386992] Load payload from ../brom-payload/pl/pl.bin = 0x3A04 bytes
Traceback (most recent call last):
  File "/home/sk3lnx22/Scrivania/AMAZON_FIRE_TV_STICK_3RD_GEN_S3L46N/kamakiri-sheldon-1.0/kamakiri/modules/main.py", line 137, in <module>
    main(dev)
  File "/home/sk3lnx22/Scrivania/AMAZON_FIRE_TV_STICK_3RD_GEN_S3L46N/kamakiri-sheldon-1.0/kamakiri/modules/main.py", line 25, in main
    load_pl_payload(dev)
  File "/home/sk3lnx22/Scrivania/AMAZON_FIRE_TV_STICK_3RD_GEN_S3L46N/kamakiri-sheldon-1.0/kamakiri/modules/load_payload.py", line 47, in load_pl_payload
    dev.send_da(0x40001000, len(payload), 0, payload)
  File "/home/sk3lnx22/Scrivania/AMAZON_FIRE_TV_STICK_3RD_GEN_S3L46N/kamakiri-sheldon-1.0/kamakiri/modules/common.py", line 342, in send_da
    self.check(self.read(2), to_bytes(0, 2))
  File "/home/sk3lnx22/Scrivania/AMAZON_FIRE_TV_STICK_3RD_GEN_S3L46N/kamakiri-sheldon-1.0/kamakiri/modules/common.py", line 103, in check
    raise RuntimeError("ERROR: Serial protocol mismatch, expected {} got {}".format(gold.hex(), test.hex()))
RuntimeError: ERROR: Serial protocol mismatch, expected 0000 got 2001
 

Finnzz

Senior Member
Sep 26, 2017
378
194
ur hel

very nice ur support, thanks !
unfortunately I get this issue :
Code:
Serial protocol mismatch, expected 0000 got 2001
tried several time and no signs of improvement, searching for fix, any help ?
Your Stick was probably updated to firmware newer than PS7273 (~March 2022), and Amazon patched the exploit.

Unfortunately no new exploit has been found and released since then, so there is nothing that can be done.
 

Top Liked Posts