-
-
Notifications
You must be signed in to change notification settings - Fork 348
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Xiaomi 14 Hyper OS 2.0.4.0 Request parameter error (10000) #245
Comments
i was able to solve this after moving this to C:\php but now i am getting this error Warning: Trying to access array offset on value of type null in C:\php\bypass.php on line 333 |
I HAVE FIXED CODE: BUT NOW THIS: SAD |
thanks bro ill try |
I think its because of our settings app https://github.com/TheAirBlow/HyperSploit try this and you'll see an error so yeah.. also downgrading doesnt work SAD :(((( |
@ManikSharma69420 I did not upgrade either; (also have Xiaomi 14, HyperOS 1.0); but Hypersploit eventually also gave me "Request parameter error (10000)". Did you get around it yet? |
You problem is easy to solve as you can install settings.apk software which has the bug which let you Bypass so you can download it from release section of this repo but mine is hyper OS 2 which doesn't support that setting apk because it was made for Android 14 |
Did you finally unlock the xiaomi 14 bootloader? Is it the China Version? Appreciate if you tell me |
No bro I didn't unlock and china mainland OS they have stopped bootloader
unlock for them.
Now doing offical way increasing my level to 5 and then apply for
bootloader unlock china time 00:00
…On Sat, 25 Jan 2025, 5:28 am liaofuyu1, ***@***.***> wrote:
Did you finally unlock the xiaomi 14 bootloader? Is it the China Version?
Appreciate if you tell me
—
Reply to this email directly, view it on GitHub
<#245 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AFVDNSFQ2DS356ZA2AW3WOT2MLHR5AVCNFSM6AAAAABVO7ON3SVHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMZDMMJTGYZDEMRRGM>
.
You are receiving this because you authored the thread.Message ID:
***@***.***
com>
|
Bro I can't install the app if you CAN please share the apk with me, many thanks |
Try see if this work or not mentioned
https://github.com/MlgmXyysd/Xiaomi-HyperOS-BootLoader-Bypass/releases/download/1.0-fix/Settings_Redmi_marble_V816.0.5.0.UMRINXM.zip
…On Mon, 27 Jan 2025, 9:08 am Manik Sharma, ***@***.***> wrote:
@ManikSharma69420 <https://github.com/ManikSharma69420> I did not upgrade
either; (also have Xiaomi 14, HyperOS 1.0); but Hypersploit eventually also
gave me "Request parameter error (10000)".
Did you get around it yet?
You problem is easy to solve as you can install settings.apk software
which has the bug which let you Bypass so you can download it from release
section of this repo but mine is hyper OS 2 which doesn't support that
setting apk because it was made for Android 14
Bro I can't install the app if you CAN please share the apk with me, many
thanks
Because I have seen many settings.apk but it doesn't work on my phone (sad)
—
Reply to this email directly, view it on GitHub
<#245 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AFVDNSFFCQSNXYFWD37GSUL2MWS2DAVCNFSM6AAAAABVO7ON3SVHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMZDMMJUG44TCNZTG4>
.
You are receiving this because you authored the thread.Message ID:
***@***.***
com>
|
I have followed the instructions but I got error when I click on Add Account script get error.
Xiaomi HyperOS BootLoader Bypass *
By NekoYuzu
Version 1.0 *
GitHub: https://github.com/MlgmXyysd
XDA: https://xdaforums.com/m/mlgmxyysd.8430637
X (Twitter): https://x.com/realMlgmXyysd PayPal: https://paypal.me/MlgmXyysd
My Blog: https://www.neko.ink/
[INFO] Finding BootLoader unlock bind request...
Now you can bind account in the developer options.
[2025-01-19] [18:38:11] [INFO] Account bind request found! Let's block it.
[2025-01-19] [18:38:11] [INFO] - Refactoring parameters...
PHP Fatal error: Uncaught Error: Call to undefined function openssl_decrypt() in C:\Users\sali9\Downloads\php\bypass.ph ✔p: 230
Stack trace:
#0 C:\Users\sali9\Downloads\php\bypass.php(330): decryptData('#&^qTSCuLmS4D5Y...')
#1 {main}
thrown in C:\Users\sali9\Downloads\php\bypass.php on line 230
Fatal error: Uncaught Error: Call to undefined function openssl_decrypt() in C:\Users\sali9\Downloads\php\bypass.php:230 Stack trace: #0 C:\Users\sali9\Downloads\php\bypass.php (330): decryptData('#&^qTSCuLmS4D5Y...') #1 {main}
thrown in C:\Users\sali9\Downloads\php\bypass.php on line 230
C:\Users\sali9\Downloads\php>
The text was updated successfully, but these errors were encountered: