Solutions and source Code

Mediatek devices PL Exploit (Preloader mode) Protocol

Mediatek devices PL Exploit(Preloader mode) (sec ctrl 0 status) peorocol is ready

As you know, in the new updates Mediatek devices do not allow access to bootrom in newer security
Generally only Preloader Mode is available, in new security updates we cannot switch the device from Preloader Mode to Brom Mode
We have written the protocol related to Preloader mode for various processors including MT68XX, which comes with the following features

This features no need to set TestPoint

Features List:

  • DA Parser
  • bypass da1,da2 (+AES) and boot device DA
  • Read GPT
  • Parse GPT
  • Read Partition (sector address)
  • Write Partition (sector address)
  • Erase Partition (sector address)
  • Read RPMB
  • Write RPMB
  • Erase RPMB
  • Unlock Bootloader
  • Relock bootloader
  • Factory Reset
  • Execute CMDs
  • ….

Supported Device :

  • OPPO
  • VIVO

Supported Platform List:

  • MT67XX , MT68XX
  • DA file is not ready for all MT67XX , MT68XX , but the devices we mentioned below in this post are ready for them. In the coming days, if new da files and code updates are applied, we will send them to you for free.

Tested On:


  • Oppo A53 5G
  • Oppo Reno4 SE
  • Oppo A94 5G
  • Oppo A95 5G
  • Oppo F19 Pro+ 5G
  • Oppo Reno5 Z
  • Oppo Reno6 Z
  • Oppo K7x
  • Oppo A72 5G


    • SM-A037F
    • SM-A042F
    • SM-A045F
    • SM-A226B


  • MT6765
  • MT6768
  • MT6761
  • MT6771
  • MT6893
  • MT6877
  • MT6833
  • MT6853

Source code is ready for:
C++\QT , C#.Net , VB.Net

Contact us:

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button