VIVO Y12 - Y15 ( 1901-1904 ) NEW PATCH SECURITY 2022 FACTORY RESET DONE

hi everyone back with me, today I will show you that now for vivo y12 - vivo y15 1901 1904 new patch security 2022 we can handle it using cm2 dongle or you can also use smartphone flash tool, with only one condition that we will use test point to be able to bypass brom on vivo y12 or y15, how to test point I'm sure you will be able to, I will provide a test point from vivo y12 or vivo y15 for you to see in the image below this article

VIVO Y12 - Y15 ( 1901-1904 ) NEW PATCH SECURITY 2022 FACTORY RESET DONE

factory reset / remove passcode / screen lock vivo y12 1901 new patch 2022 with flash tool or maybe if you have a tool or dongle that you usually use to repair smartphones, you can also use it, but still you have to do a test point, because for vivo devices it can't be as easy as we did, so once again here we will use a test point for the screen lock / forgot pattern format, following the steps for the restoration of the Vivo Y12 1901 and also the file that I used

Vivo Y12-Y15 Scatter File Only

Mediatek SP Driver Installer

Smartphone Flash Tool V5.1952

MCT MTK Auth Bypass Tool Rev4

1. for the first time you must have opened all cases from Vivo Y12, because here again we will use a test point, I'm sure you can do this one thing, for a Vivo Y12 test point - you can see a Vivo Y15 test point at the following picture

2. as usual before the process, we will filter our device with libsubwin32 but before that you have to install the mediatek auto driver installer until it's finished, and for how to filter mediatek drivers you can use this page How to Filter Device Drivers with Libusbwin32, after that then you follow the steps which I will explain below

3. extract the scatter file vivo y12, extract also the smartphone flash tool, extract the mct mtk auth bypass tool rev4, after that open and run the smartphone flash tool then in the "download agent" we fill it by default from flash tool v5.1952, for " authentification file " leave it empty, for " scatter loading " we enter the scatter file from the scatter only vivo y12 folder " MT6765_android_scatter.txt " then uncheck the " preloader " section

VIVO Y12 - Y15 ( 1901-1904 ) NEW PATCH SECURITY 2022 FACTORY RESET DONE

4. after that go to the "format" menu tab then we select "manual flash format" and please fill in the start address and also the format length on the smartphone flash tool like this

Manual Factory Reset

Beginning Address : 0x17f800000

Format Length : 0xc0000000

Google FRP Bypass Manual

Beginning Address : 0x5588000

Format Length : 0x100000

VIVO Y12 - Y15 ( 1901-1904 ) NEW PATCH SECURITY 2022 FACTORY RESET DONE

5. after everything is filled, now you open and run the mct mtk atuh rev4 then click the "Bypass" menu and now it's time for you to do a test point on the vivo y12 so that later it won't be read by the usb vcom preloader, with this test point we can enter as mtk usb port ( mtk brom ) if the device has been read with mediatek usb serial port com we just close the mct mtk auth tool and return to the flash tool

6. on the smartphone flash tool, now we select the "option" tab then select "option" again and select "connection" again for the connection section, we change it to UART, then on serial com we adjust serial com from the results of mct mtk auth tool, after appropriate we can select the "Start" menu on the smartphone flash tool and let the process run itself immediately, when finished there will be a notification like this

VIVO Y12 - Y15 ( 1901-1904 ) NEW PATCH SECURITY 2022 FACTORY RESET DONE

when you have managed to overcome the vivo y12 1901 using the method I described above, but there will be information on your account verification, maybe you should be able to handle it in the same way but in the manual address section we change it to Manual Byppass FRP Google Account and done

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel