Benjie97

Benjie97

Technician
4/21/2026
Device

TCL 4188S

Operation
FRP Reset
Path

Nck>frp

NCK Box Dongle Tool

Get this tool on GsmZone

View Tool →

FRP ResetTCL 4188SLog

Job: Erase Userdata + FRP
Mode: Brom security bypass
 
Connect Device in BROM Mode using VOL UP + DOWN and insert cable.
New device need TESTPOINT for BROM Mode.
Waiting for device...Found
Port Info	:	MediaTek USB Port (COM30) [\\?\usb#vid_0e8d&pid_0003#5&d975007&0&1#{a5dcbf10-6530-11d2-901f-00c04fb951ed}]
 	:	MediaTek Inc., 3.0.1511.0 [usb2ser.sys]
 	:	BROM PORT
Hw ID	:	MT6761 [0717] Helio A20/P22/A22/A25/G25
Details	:	8A00,CA01,0200
Sec. Cfg	:	[SBA Active] [SLA Active] [DAA Active]
MEID	:	DFBF1687EEE71D55A23803AB962F7393
SoC ID[0]	:	4F96CAF12031628BB95C157D3180F7F9
SoC ID[1]	:	84B94FFCD7C255F1A04A067482694735
Executing Exploit...Done
Reading Preloader...OK
Saved as	:	preloader_jetta_vzw.bin
Loading EMI Config from Preloader...OK
Sec. Cfg	:	[SBA Inactive] [SLA Inactive] [DAA Inactive]
Sending DA1...OK
Running DA1...OK
Waiting DA SYNC Signal...OK
Setting Checksum Level...Done [Storage]
Connection	:	brom
Speed	:	HIGH-SPEED
Reading EMI Configuration...OK
EMMC CID	:	D6010341334135353112603D0AD119BF
Sending EMI Config...OK
Sending 2nd DA...OK
Activating DA Extension...OK
HRID	:	F55866B6BAC5112415708DE4CC4B1290
Int. RAM	:	0x0000000000039000 [228 KB]
Ext. RAM	:	0x00000000C0000000 [3 GB]
Flash ID	:	A3A551
CID	:	D6010341334135353112603D0AD119BF
BOOT1	:	0x0000000000400000 [4 MB]
BOOT2	:	0x0000000000400000 [4 MB]
RPMB	:	0x0000000001000000 [16 MB]
USERAREA	:	0x000000073A000000 [28.91 GB]
 
Reading Parititon Info...OK
Reading info
 
***************
[S]Manufacturer: TCL
[S]Brand: TCL
[S]Device: Jetta_VZW
[S]Model: 4188S
[S]Name: 4188S
[S]Build ID: SP1A.210812.016
[S]Android Version: 12
[S]SDK: 31
 
Security Data Not Found!
Formating Userdata...Done
Reset FRP Data...Done
Process finished
[NCK Online MTK Exploit Tool v0.3.3]
0 10

Comments

No comments yet