Open thomasloven opened 1 month ago
Well...
I extracted the flash and looked through the startup scripts for anything using /proc/cmdline
or /dev/mmc0
and things are looking bleak.
The only thing I've managed so far is stop ppsapp from launching at all, by adding noapp
to the commandline. But that seems a bit counterproductive.
I've also dug through the executables a bit, and I think that the up.bin
that's been mentioned in some other issue is not actually useful. It seems to me that that is a temporary file that's downloaded by ppsapp itself for doing upgrades from the internet. So it probably won't be read unless it's also just been downloaded.
Patching the flash and writing it back using ppsMmcTool and partition hacking does not sound fun, so I think this is where my journey ends. 25$ for a few nights of entertainment and exploration is good enough, I guess.
You are correct that the way the hack works is by getting commands to execute using a 'crafted' boot parameter that is parsed by one of the startup scripts. If you can share the firmware you extracted I would gladly take a look to see if I find anything we can use, but it is not always the case we can find a way to root it. Obviously if you're willing to go the hardware programmer route, that is usually possible, but yes, it does require tools and some tinkering with the hardware itself (desoldering/soldering/etc).
Hi!
I found a cheap indoor camera sold under the label "Bright" in Sweden. The board says MINI19S, and firmware is somewhere in the 6.X.X range according to the Tuya app (I just checked quickly and then got that abomination off my phone ASAP).
I've gotten serial output from U-boot but have not been able to interrupt it. It says "Press any key to interrupt auto boot", but doesn't respond to anything I send.
It does not respond to PpsFactoryTool, and
nmap
only finds port 6668The kernel is booted from 0x80008000, but
fatload
reads the env file to 0x82008000. With that I've been able to read and change the environment variables.The
ipaddr
variable seems unused, but by overwritingboot_normal
I've managed to get serial output from the kernel after boot and also change the cmdline (as verified through the serial output).The kernel echoes serial input, but doesn't seem to otherwise respond. There's no login prompt.
So far I've tried the following env changes:
But
initrun.sh
does not seem to run. I've modified that to only write thehack
file, but still nothing.That said, I don't know why the old one worked. Was the whole
ip=30;...
some kind of injection to a boot script and an entirely new backdoor will be required for this one? (Edit: I just saw this. Probably the same thing with S80Network then...)I guess the next step will be to try to extract the flash, and then I guess I'll have to learn Ghidra again...
Pictures:
Boot console output:
A few extra lines if booted with reset held and ppsMmcTool present:
Original printenv: