Bypass MediaTek SP Flash Tool SLA DAA Authentication

Bypass MediaTek SP Flash Tool SLA DAA Authentication

In this guide, we will show you the steps to bypass MediaTek’s SP Flash Tool SLA and DAA Authentication. Xiaomi devices are among the most active devices when it comes to custom development. Be it flashing custom ROMs, or installing TWRP, the possibilities stand endless. However, as of late, things aren’t looking great for these device owners, especially if they are among the tech enthusiasts. Recently the OEM decided to block the EDL mode.

Generally, it is quite easy to restore the device to working condition by flashing stock firmware via Fastboot Commands. However, that isn’t the case when the device gets soft-bricked. For the unawares, flashing firmware only works in soft brick or bootloop devices when you are able to access the Fastboot Mode. In hard bricked, the only way out is to let your device be able to communicate with a specific tool in Emergency Download Mode.

However, with each passing day, developers are coming forward with new ways to bypass this limitation. While we haven’t yet reached the endpoint, but we are definitely reaching there. As of now, if you own a MediaTek powered device from any company, then you are in for a piece of good news. You could now easily bypass MediaTek’s SP Flash Tool SLA and DAA Authentication. This will make it possible to flash the firmware onto the bricked device without requiring authorization of any kind! Let’s check out how this could be achieved.

What is SP Flash Tool’s SLA and DAA Authentication For MediaTek?

Similar to Qualcomm device’s EDL mode, MediaTek devices have the Download Mode. This mode is used by service center employees to force-flash the firmware onto bricked devices. This flashing was carried out via the SP Flash Tool, a popular name in this MTK domain. In earlier times, if any user bricked their MediaTek device, then they could easily flash the firmware via SP Flash Tool by booting their device to Download Mode.

But to prevent the users from carrying out this process, the OEMs began putting “Serial Link Authentication (SLA)” and “Download Agent Authentication (DAA)” in place. As a result, only the people who have the authorized Download Agent or Serial Link programs could carry out this flashing. So who were these people? Well, they are the authorized service center personnel. Hence if you ever bricked your device, you would have no option but to take your device to these centers.

But you could now keep all these issues to rest. Thanks to an exploit, it is now possible to keep both these SLA and DAA flags to false. As a result of which, the tool wouldn’t even check for either of these flags. Hence you will be able to straightway bypass this restriction and flash the firmware on your MTK device booted to Download Mode. And in this guide, we will help you with just that. Given here are the steps to bypass MediaTek SP Flash Tool SLA and DAA Authentication. Follow along.

How to Bypass MediaTek SP Flash Tool SLA DAA Authentication

The below instructions are listed under separate sections for ease of understanding. Make sure to follow in the exact same sequence as mentioned below. With that said, the entire credits for these tweaks go to XDA developers Dinolek and k4y0z. Furthermore, make sure to check the supported chipset section below. Only proceed with the instructions if your device falls under that bracket.

More chipsets might be added in the near future, so make sure to check this page after regular intervals. Droidwin and its members wouldn’t be held responsible in case of a thermonuclear war, your alarm doesn’t wake you up, or if anything happens to your device and data by performing the below steps.

Supported MediaTek Chipsets


STEP 1: Install Python

  1. First and foremost, you will have to install Python on your PC. So download it from its official site.
  2. Then double click on its EXE file to launch the setup.
  3. Click on the Add Python to Path option situated at the bottom of the menu.
    Bypass SP Flash Tool authentication via python unbrick xiaomi
  4. Then select the Install Now option if you wish to install it in the default location (recommended). Or select a different directory via the Customize Install option.
  5. If you proceed with the default directory then the installation location will be:
  6. Remember this location as it will be used throughout the guide to bypass MediaTek SP Flash Tool SLA and DAA Authentication.

STEP 2: Install Python Dependencies

install python pyusb json5

  1. Head over to the installation directory, type in CMD in its address bar, and hit Enter.
  2. This shall launch the Command Prompt window.
  3. Copy-paste the below command in the CMD window and hit Enter:
    pip install pyusb pyserial json5
  4. With this, we have installed the required dependencies via the PIP command.

STEP 3: Install libusb-win32

This library allows the user-space applications to access many USB devices on your Windows PC. This is actually the port of libusb-0.1 under Windows.

lib usb win 32 setup bypass MediaTek SP Flash Tool SLA and DAA Authentication

  1. So download the libusb-win32 onto your PC.
  2. Then double click on the libusb-win32-devel-filter- file to launch the setup.
  3. Now, follow the onscreen instructions to complete the installation.

STEP 4: Download MTK Bypass Utility Tool

mediatek bypass utility tool bypass SP Flash Tool SLA and DAA Authentication

  1. Download the MTK Bypass Utility software from GitHub.
  2. Then extract its content to any convenient location on your PC.
  3. Now transfer all these files to the Python installation directory [extremely important].

STEP 5: Boot MediaTek Device to Download Mode

The next step to bypass MediaTek SP Flash Tool SLA and DAA Authentication requires your device to be booted to Download Mode. Here’s how it could be done:

  1. To begin with, power off your device.
  2. Now press the Volume Up button (or Volume Down for Xiaomi devices).
  3. Keeping the button pressed, plug in your device to the PC via USB cable.
  4. That’s it. Your device shall now be booted to Download Mode.

STEP 6: Install SP Flash Tool

launch sp flash tool

If you haven’t installed the SP Flash Tool onto your PC, then now is probably the best time to do so. Hence download the and extract its content to any convenient location on your PC.

STEP 7: Bypassing SP Flash Tool SLA DAA Authentication

Make sure that your device is connected to the PC via USB cable and is booted to Download Mode. Likewise, you should have transferred the contents of the MTK Bypass Tool to the Python installation directory. If that’s all well and good, then proceed with the below steps to bypass MediaTek SP Flash Tool SLA and DAA Authentication.

  1. Type in CMD in Python’s address bar and hit Enter. This shall launch Command Prompt inside the Python installation directory.
    python cmd window
  2. Now type in the below command to run the python file:
  3. As soon as it’s done, you should get “Protection Disabled, Press any key to continue”.

    Credits: XDA Developer
  4. Now launch the SP Flash Tool (double click on the flash_tool.exe file).
  5. Then go to the Options section and select Connection from the left menu bar (see below image).
  6. Now select UART under the Connection Settings menu.
    sp flash tool uart connection
  7. You may now flash the desired firmware without the need to authenticate Serial Link Authentication and Download Agent Authentication.

With this, we conclude the guide on how to bypass MediaTek’s SP Flash Tool SLA and DAA Authentication. If you have any queries concerning the aforementioned steps, do let us know in the comments. We will get back to you with a solution at the earliest.

About Chief Editor

7 thoughts on “Bypass MediaTek SP Flash Tool SLA DAA Authentication”

    1. Hi Tarek could you please let me know at what stage did you got this error message? Was it after executing the python command?

  1. My phone got bootloop and I can’t access neither to fastboot nor to recovery mode. Just poco logo appears and restart again again….
    Please help me sir

  2. Huge respects for a very detailed procedure. For me, progress with this tryout is impeded by failure to access the libusb64 for my 64bit win10 OS.
    There seems to be no .EXE file available on the library website for download. I do hope there’s an alternative solution as the would greatly help my situation.


Leave a Comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.