If there's a complete description on how it should be hacked (e.g., what HTTP messages should be sent and where), and it's feasible and can be quickly (say, in a day at most) written, I can code it...
If there's a complete description on how it should be hacked (e.g., what HTTP messages should be sent and where), and it's feasible and can be quickly (say, in a day at most) written, I can code it...