A PoC that exploits a vulnerability to bypass the Xiaomi HyperOS community restrictions of BootLoader unlocked account bindings.
2.65k
stars
299
forks
source link
The system is being upgraded. Please try again later. (30003) Redmi Note 13 Pro 5G(garnet) #128
Closed
MatXia closed 3 months ago
[2024-06-03] [11:02:53] [INFO] - **** [2024-06-03] [11:02:53] [INFO] - Xiaomi HyperOS BootLoader Bypass [2024-06-03] [11:02:53] [INFO] - By NekoYuzu Version 1.0 [2024-06-03] [11:02:53] [INFO] - **** [2024-06-03] [11:02:53] [INFO] - GitHub: https://github.com/MlgmXyysd [2024-06-03] [11:02:53] [INFO] - XDA: https://xdaforums.com/m/mlgmxyysd.8430637 [2024-06-03] [11:02:53] [INFO] - X (Twitter): https://x.com/realMlgmXyysd [2024-06-03] [11:02:53] [INFO] - PayPal: https://paypal.me/MlgmXyysd [2024-06-03] [11:02:53] [INFO] - My Blog: https://www.neko.ink/ [2024-06-03] [11:02:53] [INFO] - **** [2024-06-03] [11:02:53] [INFO] - Starting ADB server... [2024-06-03] [11:02:54] [INFO] - Processing device 7079523a(3)... [2024-06-03] [11:02:54] [INFO] - Finding BootLoader unlock bind request... [2024-06-03] [11:02:54] [INFO] * Now you can bind account in the developer options. [2024-06-03] [11:02:58] [INFO] - Account bind request found! Let's block it. [2024-06-03] [11:02:58] [INFO] - Refactoring parameters... [2024-06-03] [11:02:58] [INFO] - Sending POST request... [2024-06-03] [11:03:01] [INFO] - The system is being upgraded. Please try again later. (30003)