hi I started to find bug bounty vulnerabilities and i think i found a te.cl vulnerability in a website.
i send
GET / HTTP/1.1
Transfer-Encoding: chunked
Host: subdomain.domain.com
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.87 Safari/537.36
Content-type: application/x-www-form-urlencoded; charset=UTF-8
Content-Length: 6
0
GET / HTTP/1.1
Host: subdomain.domain.com
and i get in return
HTTP/1.1 302 Moved Temporarily
Location: https://other_subdomain.domain.com/somewhere/
Server: server_name
Content-Length: 0
Date: Thu, 04 Feb 2021 02:27:57 GMT
Connection: keep-alive
HTTP/1.0 400 Bad Request
Server: AkamaiGHost
Mime-Version: 1.0
Content-Type: text/html
Content-Length: 216
Expires: Thu, 04 Feb 2021 02:27:57 GMT
Date: Thu, 04 Feb 2021 02:27:57 GMT
Connection: close
<HTML><HEAD>
<TITLE>Bad Request</TITLE>
</HEAD><BODY>
<H1>Bad Request</H1>
Your browser sent a request that this server could not understand.<P>
Reference #7.9697f648.1612405677.0
</BODY>
</HTML>
what did i miss? how can i make the second request be a legitimate request?