Open MiKuBB opened 3 years ago
FWIW, this isn't unique to the EU plugs; I get a very similar-looking response my ESW01-USA. The first bits are identical, the last bits are different. I assume Etekcity patched this particular access method. That assumption is supported from my memory, because I recall when I fist got these plugs years ago, the app did not ask to connect to the ESP_* network, so probably was using AirKiss, now it asks to connect to the switch's wifi.
I spent many hours over the past couple of weeks trying to find a different way to break in. For me, the first step after using the app to tell it to connect to my honeypot wifi, is it makes some non-MQTT connection to vdmpmqtt.vesync.com:1883
- That resolves to a URL which seems like it should be an AWS Kafka instance, but the payload doesn't seem to be Kafka either.
I spent many further hours looking at a decompiled dump of the firmware, but I couldn't make much progress. This is not my area of expertise, so someone else might be able to do more.
The US ones are amazingly difficult to get open to reflash using the serial connection. I've decided they're not worth my time (nor the risk to my fingers). I'm going to donate mine, and buy some more-easily-customized plugs.
Hi, I would like to ask for help with hijacking EU plugs. I own some ESW01-EU version plugs, and trying to flash it with alternative firmware. I have found guide on esphome but I can't disassemble plugs. Something in construction is changed so it's impossible to make it without damaging plug. After hours of browsing I have found this project which brings new hope to me :)
According to esphome guide https://esphome.io/cookbook/esw01-eu.html I can communicate with plug soldering some wires without removing PCB from plug case. However I can't locate PIO0 so can't turn ESP into flash mode :-(
As I can see from serial communication my FW version is 1.1.02
after calling node ./index.js -s SSID -b BSSID -p password -i 192.168.133.x -d 192.168.4.1 i see somethin like this
and Etekcity AP stop responding ...
I have tryed to update FW using VeSync APP but with no luck hijack output is the same, only changed thing is that the AP is still functional .
So it will be so good if somebody can help be to manage hijacking of this EU plugs. thank you mk