MlgmXyysd / Xiaomi-HyperOS-BootLoader-Bypass

A PoC that exploits a vulnerability to bypass the Xiaomi HyperOS community restrictions of BootLoader unlocked account bindings.
https://www.neko.ink/
2.57k stars 295 forks source link

mi 10t 5g #169

Open OwOday opened 2 weeks ago

OwOday commented 2 weeks ago

I think technically this is MIUI but I get this with the script: [2024-08-28] [22:55:16] [INFO] - ************************************ [2024-08-28] [22:55:16] [INFO] - * Xiaomi HyperOS BootLoader Bypass * [2024-08-28] [22:55:16] [INFO] - * By NekoYuzu Version 1.0 * [2024-08-28] [22:55:16] [INFO] - ************************************ [2024-08-28] [22:55:16] [INFO] - GitHub: https://github.com/MlgmXyysd [2024-08-28] [22:55:16] [INFO] - XDA: https://xdaforums.com/m/mlgmxyysd.8430637 [2024-08-28] [22:55:16] [INFO] - X (Twitter): https://x.com/realMlgmXyysd [2024-08-28] [22:55:16] [INFO] - PayPal: https://paypal.me/MlgmXyysd [2024-08-28] [22:55:16] [INFO] - My Blog: https://www.neko.ink/ [2024-08-28] [22:55:16] [INFO] - ************************************ [2024-08-28] [22:55:16] [INFO] - Starting ADB server... [2024-08-28] [22:55:17] [INFO] - Processing device 5*****2(7)... [2024-08-28] [22:55:17] [INFO] - Finding BootLoader unlock bind request... [2024-08-28] [22:55:17] [INFO] * Now you can bind account in the developer options. [2024-08-28] [22:55:23] [INFO] - Account bind request found! Let's block it. [2024-08-28] [22:55:23] [INFO] - Refactoring parameters... [2024-08-28] [22:55:23] [INFO] - Sending POST request... [2024-08-28] [22:55:24] [INFO] - Target account: 82*******27 [2024-08-28] [22:55:24] [INFO] - Account bound successfully, wait time can be viewed in the unlock tool.

In the settings it says, Added successfully, Mi account is now associated with this device.

However, in mi unlock tool, I get: image

OwOday commented 2 weeks ago

On the newer version I get image

OwOday commented 2 weeks ago

Also, slightly unrelated, but here's what happens when I post on Xiaomi forums about it: image