Her eyes welled up. "Thank you. Most people would have charged me a hundred bucks."

The terminal on his laptop lit up.

[>] Scanning for Huawei diagnostics port... found on ttyUSB0 [>] Bypassing FRP handshake... injecting null token. [>] Vulnerability CVE-2021-0315 active. [>] Google Account Manager reset. Status: SUCCESS. [>] FRP LOCK: OFF. It took eleven seconds.

Leo sighed. He had a drawer full of "professional" USB dongles—$300 each, licensed, for paid FRP tools. But his rent was due. He looked at her pleading eyes, then at his own reflection in the dark store window.

Leo just shrugged, watching her leave into the rain. He locked the door, then stared at his terminal.

The forums called it "the ghost tool." No one knew who made it. It exploited a long-patched vulnerability in the Huawei emergency call service. The tool didn't brute-force or hack. It negotiated .