MlgmXyysd / Xiaomi-HyperOS-BootLoader-Bypass

A PoC that exploits a vulnerability to bypass the Xiaomi HyperOS community restrictions of BootLoader unlocked account bindings.
https://www.neko.ink/
2.76k stars 305 forks source link

unsuccess to unlock (system version:1.0.20.0.UNCCNXM) #3

Closed nenemiku closed 10 months ago

nenemiku commented 10 months ago

看到其他的B站评论有说1.0.14以后的版本解锁会失败。我这边的操作是成功连接后,点击解锁移动数据被关闭,提示解锁失败,CMD里显示 [INFO] - Refactoring parameters... PHP Fatal error: Uncaught Error: Call to undefined function openssl_decrypt() in J:\mi\php-8.3.0-nts-Win32-vs16-x64\bypass.php:230 Stack trace:

0 J:\mi\php-8.3.0-nts-Win32-vs16-x64\bypass.php(330): decryptData('8/8Mnp7WcRph8sb...')

1 {main}

thrown in J:\mi\php-8.3.0-nts-Win32-vs16-x64\bypass.php on line 230

Fatal error: Uncaught Error: Call to undefined function openssl_decrypt() in J:\mi\php-8.3.0-nts-Win32-vs16-x64\bypass.php:230 Stack trace:

0 J:\mi\php-8.3.0-nts-Win32-vs16-x64\bypass.php(330): decryptData('8/8Mnp7WcRph8sb...')

1 {main}

thrown in J:\mi\php-8.3.0-nts-Win32-vs16-x64\bypass.php on line 230

MlgmXyysd commented 10 months ago

https://github.com/MlgmXyysd/Xiaomi-HyperOS-BootLoader-Bypass?tab=readme-ov-file#%EF%B8%8F-how-to-use

Enable OpenSSL and Curl extension in php.ini.

chrisuhg commented 10 months ago

指定你php的ext文件夹位置。 image

SVENDEMAN100 commented 1 month ago

This does NOT solve the issue unfortunately.

指定你php的ext文件夹位置。 image