Solved

Lg g3 bricked

Posted on 2016-09-03
3
423 Views
Last Modified: 2016-09-24
Lg g3 d850 has
-No Download Mode
-No Recovery
-Black Screen & nothing on it.
-When plugged in via USB it shows up on the pc as: LGE AndroidNet USB Serial Port
-LG Flash Tools will not work.
-When plugged in with no battery, the screen lights up with a symbol with a battery and an exclamation point.
0
Comment
Question by:Kim Mason
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 96

Assisted Solution

by:Experienced Member
Experienced Member earned 200 total points (awarded by participants)
ID: 41783616
Can you force the phone OFF?   Once off, then try turning it back on.

Does that get it going?
0
 
LVL 47

Accepted Solution

by:
Jackie Man earned 300 total points (awarded by participants)
ID: 41785423
From my experience, it is a hardware problem and you cannot fix it on your own.

There is a discussion and a fix on XDA forum for your problem.

LG G3 Shows Up As LGE AndroidNet USB Serial Port
http://forum.xda-developers.com/lg-g3/help/lg-g3-lge-androidnet-usb-serial-port-t3058731

How to Fix "error device not found in dload trying flash programmer" when use boardiag .
http://forum.xda-developers.com/lg-g3/general/unbrick-lg-g3-qhsusbbulk-qualcomm-9008-t3072091

But, it is just too complicated even for me to follow through.

If I were you, I will forget about it.
0

Featured Post

SharePoint Admin?

Enable Your Employees To Focus On The Core With Intuitive Onscreen Guidance That is With You At The Moment of Need.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Adults who share images on social media aren’t the only ones who need to worry about their privacy. Our culture’s tendency to share every move and celebration affects the privacy of our children, too.
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Add bar graphs to Access queries using Unicode block characters. Graphs appear on every record in the color you want. Give life to numbers. Hopes this gives you ideas on visualizing your data in new ways ~ Create a calculated field in a query: …

628 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question