MlgmXyysd / Xiaomi-HyperOS-BootLoader-Bypass

A PoC that exploits a vulnerability to bypass the Xiaomi HyperOS community restrictions of BootLoader unlocked account bindings.
https://www.neko.ink/
2.57k stars 295 forks source link

The CMD return a log "Request parameter error (10000)" #160

Open Kkongry0819 opened 1 month ago

Kkongry0819 commented 1 month ago

I installed the latest release version of PHP (php -8.3.10)

My phone, which I wanted to unlock the BL, is a Xiaomi 12

I believe that I have configured ‘php.ini’ correctly

How can I fix this problem? 屏幕截图 2024-08-10 021557

FeelLiao commented 1 month ago

same problem here

lexavey commented 1 month ago

update settings.apk first.

ahadobas commented 1 month ago

update settings.apk first.

Downloaded, tried to install, but got: Screenshot_2024-08-12-14-56-37-090_com google android packageinstaller-a

lexavey commented 1 month ago

Downloaded, tried to install, but got:

I have no idea, you can try browse on this repo issue page, I'm using POCO X5 PRO and can install/update the apk.

lexavey commented 1 month ago

See this reason why error 10000. Use google translate. https://github.com/MlgmXyysd/Xiaomi-HyperOS-BootLoader-Bypass/issues/144#issuecomment-2251043736

ahadobas commented 1 month ago

See this reason why error 10000. Use google translate. #144 (comment)

As I seen:

This is because Xiaomi changed the log encryption algorithm from pure AES to RSA+AES hybrid encryption in the new version of the system. RSA asymmetric encryption cannot be decrypted without a private key, so the script cannot operate normally.

Is there a way to get the "private key" from my phone and insert it into the script?

lexavey commented 1 month ago

Is there a way to get the "private key" from my phone and insert it into the script?

Maybe this https://github.com/MlgmXyysd/Xiaomi-HyperOS-BootLoader-Bypass/pull/78#issuecomment-2106104350 can help you get apk for your device, for get plain private key I dont know.

lexavey commented 3 weeks ago

image After a week

yuniers commented 1 week ago

I'm in same situation.

php-adb php bypass.php
[2024-09-04] [18:44:30] [INFO] - ************************************
[2024-09-04] [18:44:30] [INFO] - * Xiaomi HyperOS BootLoader Bypass *
[2024-09-04] [18:44:30] [INFO] - * By NekoYuzu          Version 1.0 *
[2024-09-04] [18:44:30] [INFO] - ************************************
[2024-09-04] [18:44:30] [INFO] - GitHub: https://github.com/MlgmXyysd
[2024-09-04] [18:44:30] [INFO] - XDA: https://xdaforums.com/m/mlgmxyysd.8430637
[2024-09-04] [18:44:30] [INFO] - X (Twitter): https://x.com/realMlgmXyysd
[2024-09-04] [18:44:30] [INFO] - PayPal: https://paypal.me/MlgmXyysd
[2024-09-04] [18:44:30] [INFO] - My Blog: https://www.neko.ink/
[2024-09-04] [18:44:30] [INFO] - ************************************
[2024-09-04] [18:44:30] [INFO] - Starting ADB server...
[2024-09-04] [18:44:30] [INFO] - Processing device lvcuamdahizhpfvs(device:ruby)...
[2024-09-04] [18:44:30] [INFO] - Finding BootLoader unlock bind request...
[2024-09-04] [18:44:30] [INFO] * Now you can bind account in the developer options.
[2024-09-04] [18:44:35] [INFO] - Account bind request found! Let's block it.
[2024-09-04] [18:44:35] [INFO] - Refactoring parameters...
PHP Warning:  Trying to access array offset on null in /home/sosa/Downloads/php-adb/bypass.php on line 333
[2024-09-04] [18:44:35] [INFO] - Sending POST request...
[2024-09-04] [18:44:37] [INFO] - Request parameter error (10000)