Wanxia station
Wanxia station (simplified Chinese: 湾厦站; traditional Chinese: 灣廈站; pinyin: Wānxià Zhàn; Jyutping: Waan1 Haa6 Zaam6) is a Metro station of Shenzhen Metro Line 2. It opened on 28 December 2010.
Wanxia Station | |||||||||||
Location | Nanshan District, Shenzhen, Guangdong China | ||||||||||
Operated by | SZMC (Shenzhen Metro Group) | ||||||||||
Line(s) | Line 2 | ||||||||||
History | |||||||||||
Opened | 28 December 2010 | ||||||||||
Services | |||||||||||
|
Station layout
G | - | Exit |
B1F Concourse |
Lobby | Customer Service, Shops, Vending machines, ATMs |
B2F Platforms |
Platform 1 | ← Line 2 towards Chiwan (Dongjiaotou) |
Island platform, doors will open on the left | ||
Platform 2 ↑ Platform 3 ↓ |
No regular service | |
Island platform, doors will open on the left | ||
Platform 4 | → Line 2 towards Xinxiu (Haiyue) → |
Exits
Exit | Destination |
---|---|
Exit A | Houhaibin Road (E), Zhaoshang East Road (S) |
Exit B | Houhaibin Road (E), Zhaoshang East Road (N), Helen Garden Phase III |
Exit C | Houhaibin Road (W), Zhaoshang East Road (N), Yucai Third Middle School, No. 4 Primary School of Yucai Education Group, Wanxia Village Committee, The New Platform, Aocheng Garden |
Exit D | Houhaibin Road (W), Zhaoshang East Road (S) |
gollark: What is, the evil exploit someone made?
gollark: It's a very clever exploit - they load some trusted code via PotatOS Privileged Execution™, then send it fake HTTP responses containing code.
gollark: I've probably patched it now (hard to test, because one of my changes broke the exploit code but in a way which could be worked around), but at the cost of causing minor breakage in a mostly unused feature.
gollark: I'm having to reverse-engineer yet ANOTHER heavily obfuscated potatOS sandbox exploit.
gollark: https://pastebin.com/RM13UGFa line 1275.
References
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.