Open marcusademola opened 4 years ago
do you know if the hack works with SXJ02ZM?
do you know if the hack works with SXJ02ZM?
I dont sorry, anyone else? If not would you like to give a try, document it well and publish here
Does it work with CMSXJ25A ?
This guy opened the CMSXJ16A device... https://github.com/telmomarques/xiaomi-360-1080p-hacks/issues/12#issuecomment-734817542
CMSXJ19E uses a Star SSC 323 ARM too:
https://github.com/cstrassburg/cmsxj19e-hacks/blob/main/images/IMG_20210607_164115.jpg
CMSXJ25A - SSC325 AY00255B 2010J AMR
Does it work with CMSXJ25A ?
No. I have tried this on IMILAB CMSXJ25A. It is not working with it :(
thanks @sunxueliang96 here is the firmware to recover the device: https://github.com/sunxueliang96/xiaomi-mijia-MIIO-documentsdocuments-examples-firmwares/blob/0b3a6eed97132cbb6017c749a66b2691871ec522/%E5%B0%8F%E7%B1%B3%E7%B1%B3%E5%AE%B6%E6%91%84%E5%83%8F%E5%A4%B4%E6%9C%80%E6%96%B0%E6%9C%80%E5%85%A8%E5%9B%BA%E4%BB%B6%E4%B8%8B%E8%BD%BD%E5%9C%B0%E5%9D%80.txt
Thanks for the inputs, updated the table, but its still not clear which models were succefully flashed (entered) so I didnt add hack-status column (yet). Feel free to input.
Meanwhile, I also discovered block diagram that might be useful. https://linux-chenxing.org/infinity6/ssc326d_blockdiagram.png
Someone also said there is model ipc013d MI HomeSecure 360, but I havent find reference
Btw you may want to use dustcloud to find telnet to the device https://github.com/dgiese/dustcloud (very interesting data DEFCON26 IoT Village Slides)
Here is what I manage to decipher for my MJSXJ10CM: SSC323 AP10DE8B 2114F-IM12 ARM
Here is what I manage to decipher for my MJSXJ10CM: SSC323 AP10DE8B 2114F-IM12 ARM
can be hacked too? With rtsp?
can be hacked too? With rtsp?
The RTSP hack doesn't work out of the box. I have time this summer, I will try to get it working
can be hacked too? With rtsp?
The RTSP hack doesn't work out of the box. I have time this summer, I will try to get it working
okay , i will wait for it.
тоже можно взломать? С ртсп?
Взлом RTSP не работает из коробки. У меня есть время этим летом, я постараюсь заставить его работать
waiting for. would be great
+1 from me as well! Waiting for updates, I can also help with testing and/or development.
What possible do?
IMILAB C30 (looks like C21) STAR SSC337DE AS0081B 2048 ARM
Detects as : chuangmi.camera.021e01 FCC-ID 2APA9-CMSXJ21E FW: 021501_1.6.0_0077 Open Ports: 53 domain 67 dhcps 684 cobra-iiop-ssl 772cycleserv2 959 8001 vcom-tunnel 9103 bacula-sd 17494 17638 18228 19719 20425 26720 32777 rpc18 39217 42172 45818 49180 49393 51255 53571 57843
NAME=Buildroot VERSION=2017.08-00349-gb8cf9fb-dirty ID=buildroot VERSION_ID=2017.08 PRETTY_NAME="Buildroot 2017.08" MODEL_COMMIT=87f5fc5 COMMON_COMMIT=b8cf9fb CHUANGMI_VERSION=021501_1.6.0_0077
[+ +++ ---] ali_stream uptime: 406s/-s pids: 712/- [+ +++ +++] fetch_av uptime: 406s/406s pids: 715/714 [+ +++ ---] imi_agent uptime: 406s/-s pids: 719/- [- --- ---] imi_ota (service not activated) [+ +++ +++] miio_client_helper uptime: 406s/406s pids: 723/722 [+ +++ ---] miio_devicekit uptime: 406s/-s pids: 725/- [+ +++ ---] miio_record uptime: 337s/-s pids: 1074/- [+ +++ ---] miio_sdcard uptime: 406s/-s pids: 727/- [+ +++ ---] mortox uptime: 407s/-s pids: 703/- [+ +++ ---] mstar_algo uptime: 337s/-s pids: 1078/-
Perhaps below list is helpful and would be great if you can help to populate. Especially the ARM processor list (if you opened the device please include also photo).
(status 19.12.2021 , previous versions 18.11.2021, 23.4.2020)
** = Originally the hack was done for just one model, maybe its possible to expand a little. Maybe this table can be added on wiki page, including status:)