-
Notifications
You must be signed in to change notification settings - Fork 18
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Mini 19S - Exploration documentation #60
Comments
Well... I've also dug through the executables a bit, and I think that the Patching the flash and writing it back using ppsMmcTool and partition hacking does not sound fun, so I think this is where my journey ends. |
You are correct that the way the hack works is by getting commands to execute using a 'crafted' boot parameter that is parsed by one of the startup scripts. If you can share the firmware you extracted I would gladly take a look to see if I find anything we can use, but it is not always the case we can find a way to root it. Obviously if you're willing to go the hardware programmer route, that is usually possible, but yes, it does require tools and some tinkering with the hardware itself (desoldering/soldering/etc). |
Have you had any further luck with injecting into the 6.x firmware? I am trying to get into 6.1.2 on the iegeek/xtu "Bell J9" but from what I can see you are the only one that's gotten any headway with this version so far. |
Hi!
I found a cheap indoor camera sold under the label "Bright" in Sweden.
The board says MINI19S, and firmware is somewhere in the 6.X.X range according to the Tuya app (I just checked quickly and then got that abomination off my phone ASAP).
I've gotten serial output from U-boot but have not been able to interrupt it.
It says "Press any key to interrupt auto boot", but doesn't respond to anything I send.
It does not respond to PpsFactoryTool, and
nmap
only finds port 6668The kernel is booted from 0x80008000, but
fatload
reads the env file to 0x82008000.With that I've been able to read and change the environment variables.
The
ipaddr
variable seems unused, but by overwritingboot_normal
I've managed to get serial output from the kernel after boot and also change the cmdline (as verified through the serial output).The kernel echoes serial input, but doesn't seem to otherwise respond. There's no login prompt.
So far I've tried the following env changes:
But
initrun.sh
does not seem to run.I've modified that to only write the
hack
file, but still nothing.That said, I don't know why the old one worked. Was the whole
ip=30;...
some kind of injection to a boot script and an entirely new backdoor will be required for this one?(Edit: I just saw this. Probably the same thing with S80Network then...)
I guess the next step will be to try to extract the flash, and then I guess I'll have to learn Ghidra again...
Pictures:
Boot console output:
A few extra lines if booted with reset held and ppsMmcTool present:
Original printenv:
The text was updated successfully, but these errors were encountered: