From 90416d25a563d80bae5a66c04e70f32fdb27970f Mon Sep 17 00:00:00 2001 From: martin Date: Wed, 27 Apr 2022 21:19:21 +0200 Subject: [PATCH] =?UTF-8?q?=E2=80=9Econtent/docs/Gluon/xiaomi=5F4a=5Fflash?= =?UTF-8?q?en.md=E2=80=9C=20=C3=A4ndern?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- content/docs/Gluon/xiaomi_4a_flashen.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/content/docs/Gluon/xiaomi_4a_flashen.md b/content/docs/Gluon/xiaomi_4a_flashen.md index 0ca9d4f..ee2f2bd 100644 --- a/content/docs/Gluon/xiaomi_4a_flashen.md +++ b/content/docs/Gluon/xiaomi_4a_flashen.md @@ -1,5 +1,5 @@ # Xiaomi 4a Gigabit Edition flashen - +https://openwrt.org/inbox/toh/xiaomi/xiaomi_mi_router_4a_gigabit_edition `OpenWRTInvasion|master ⇒ python3 remote_command_execution_vulnerability.py`