Open BiatuAutMiahn opened 3 years ago
unfortunately I think there is no easy way for you to get out of this state. Checking that script when this debug flag file exists, the entire app_init.sh is skipped.
what about injecting a line into rcS to remove the file?
You can modify the roots to do that. However, to get the roots onto device, your only method is sdcard recovery, which now has signature verification enabled...
I think your only solution is to take apart the camera, solder serial wire so you can get a login console over aerial. Once you get there, you can login and manually delete the file.
On Wed, Mar 31, 2021, 07:48 BiatuAutMiahn @.***> wrote:
what about injecting a line into rcS to remove the file?
— You are receiving this because you commented. Reply to this email directly, view it on GitHub https://github.com/HclX/WyzeHacks/issues/104#issuecomment-811126706, or unsubscribe https://github.com/notifications/unsubscribe-auth/AAZNWD3ZVVXFMDBJUH2TR7DTGMY2LANCNFSM4Z4SYEKA .
Can I do this without compromising the ingress protection permanently?
I'm not sure about that. I think if you do it carefully it should be fine. There are youtube videos on how to open the case carefully.
On Thu, Apr 1, 2021, 09:53 BiatuAutMiahn @.***> wrote:
Can I do this without compromising the ingress protection permanently?
— You are receiving this because you commented. Reply to this email directly, view it on GitHub https://github.com/HclX/WyzeHacks/issues/104#issuecomment-812038556, or unsubscribe https://github.com/notifications/unsubscribe-auth/AAZNWD5XS4G3LWRU56CETWDTGSQG7ANCNFSM4Z4SYEKA .
I just got into the console, it appears that WyzeHacks did run as the root passwd was updated, can we add logic to manually run wpa_supplicant from WyzeHacks init if /configs/.debug_flag
exists?
From
/system/init/app_init.sh
:After creating this file for testing an rtsp server from https://github.com/jmichault/ipcam-100 the camera will not run wpa_supplicant.
Can we have options to run wpa_supplicant if
/configs/.debug_flag
exists?