-
Notifications
You must be signed in to change notification settings - Fork 18
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
MI-CW051, any clues? #52
Comments
@dougalcampbell sorry for the late reply (busy with the holidays)... I don't have this camera, but @tyleracopeland has extracted the firmware and found that the device looks for a @tyleracopeland also created/verified the below
The above start script could be used as the |
Full disclosure: the specific camera model this information pertains to is the Merkury MI-CW057 (firmware version @dougalcampbell all you need to do is place a copy of Busybox (found here) and a file named
The last line is important as it contains the call that launches the The script above enables password-less Telnet and anonymous FTP servers with root access. However, I haven't been able to do much beyond that due to all of the main networking and video streaming functions being hard-coded into a single ELF executable named |
I have the cw-051 as well. Tried de-compiling the stream executable with ghidra. It failed. Turns out its compressed using UPXhttps://github.com/upx/upx had to use version 3.95 (version it was compressed with) to get it to decompress. Going to try analyzing it again |
My device is MI-CW051, and apparently it's different enough that your hack isn't working on it. I see somebody else has already extracted the firmware, would that help you open this sucker up?
The text was updated successfully, but these errors were encountered: