MlgmXyysd / Xiaomi-HyperOS-BootLoader-Bypass

A PoC that exploits a vulnerability to bypass the Xiaomi HyperOS community restrictions of BootLoader unlocked account bindings.
https://www.neko.ink/
2.65k stars 299 forks source link

The system is being upgraded. Please try again later. (30003) Redmi Note 13 Pro 5G(garnet) #128

Closed MatXia closed 3 months ago

MatXia commented 3 months ago

[2024-06-03] [11:02:53] [INFO] - **** [2024-06-03] [11:02:53] [INFO] - Xiaomi HyperOS BootLoader Bypass [2024-06-03] [11:02:53] [INFO] - By NekoYuzu Version 1.0 [2024-06-03] [11:02:53] [INFO] - **** [2024-06-03] [11:02:53] [INFO] - GitHub: https://github.com/MlgmXyysd [2024-06-03] [11:02:53] [INFO] - XDA: https://xdaforums.com/m/mlgmxyysd.8430637 [2024-06-03] [11:02:53] [INFO] - X (Twitter): https://x.com/realMlgmXyysd [2024-06-03] [11:02:53] [INFO] - PayPal: https://paypal.me/MlgmXyysd [2024-06-03] [11:02:53] [INFO] - My Blog: https://www.neko.ink/ [2024-06-03] [11:02:53] [INFO] - **** [2024-06-03] [11:02:53] [INFO] - Starting ADB server... [2024-06-03] [11:02:54] [INFO] - Processing device 7079523a(3)... [2024-06-03] [11:02:54] [INFO] - Finding BootLoader unlock bind request... [2024-06-03] [11:02:54] [INFO] * Now you can bind account in the developer options. [2024-06-03] [11:02:58] [INFO] - Account bind request found! Let's block it. [2024-06-03] [11:02:58] [INFO] - Refactoring parameters... [2024-06-03] [11:02:58] [INFO] - Sending POST request... [2024-06-03] [11:03:01] [INFO] - The system is being upgraded. Please try again later. (30003)