Connor Howell
Connor Howell
> > I compared a common 0GC300012A_14XX file to what was uploaded... > > SA2 bytefields are identical > > DQ381 uses ENCRYPT-COMPRESS-METHOD "AA" > > That AL551 file uses...
Why would you need an exploit? You're not writing modified data and I'm certain there's little to no chance of this having RSA even if you were. You're best bet...
It's not ARM so an ARM disassembler won't be of any use. It's a V850 series MCU from Renesas, you can read the user manual for it here: https://www.renesas.com/us/en/document/mah/v850-familytm-architecture The...
Regarding unlocking, yes since it's Simos 18.1 (SC8) you want "FL_8V0906259H__0001.frf". The only reason you'd need a different file is for Simos 18.10 (SCG). Once the unlock procedure is done...
Yes, checksumming is implemented for: Simos18, DQ250 & DQ381.
If you flashed that file and the vehicle started afterwards; it's an issue we can't resolve and it's 100% down the tune produced by the file service. VW Flash wouldn't...
So although both Simos 18 and that ODX you have specify encryption/compression AA there's still every chance the underlying methods are different. More often than not it (AA) is referencing...
For anyone coming across this in future; there seems to be an issue with assigning a value to ckeditor in the 'mounted' hook. Not 100% sure on what's causing this...
@bizsimon good point, guessing the permanent fix to this issue would be for the component to check the instance exists prior to assigning the value in the watcher for 'modelValue':...
Could you send over the files you're trying to flash? Preferably the first file you tried to flash? The log is showing as every single checksum being incorrect which doesn't...