Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Xiaofang 1S camera flashed with Dafang Hack no longer able to view stream after ISP reset my hub #1859

Open
Fookes74 opened this issue Jun 8, 2023 · 5 comments

Comments

@Fookes74
Copy link

Fookes74 commented Jun 8, 2023

Using a Xiaofang 1S camera

Hacked successfully some time ago. (over a year)

ISP sent someone to rectify system issues we had. He ended up resetting our modem/router hub and therefore resetting IP range we'd set previously. As things are now working well I'm loathe to change anything hub-wise. All of our devices are now running a different IP address than those previously set. In respect of the camera, it appears on my network and I have given it the static IP address which was assigned from the hub when it restarted after wiping. It shows as a prospective device via Homebridge in my Home app on iPhone but I do not get any images - still or video. I cannot SSH in to the camera (port 22: connection refused) and trying to access via URL (using IP address) doesn't work - nothing comes up.

Any ideas how I can re-access the video stream?

@c---
Copy link
Contributor

c--- commented Jun 8, 2023

I don't know anything about that camera. Does it boot off a SD card? If so then take the card out, mount, and modify the settings on another computer.

Does it have a factory reset button? I can't remember if that even works with the hacked cameras.

@jmtatsch
Copy link
Collaborator

jmtatsch commented Jun 8, 2023

Erase the sdcard and pull a fresh Hacks directory from git

@Fookes74
Copy link
Author

Fookes74 commented Jun 8, 2023

Hi, Thanks for the response.

I don't know anything about that camera. Does it boot off a SD card? If so then take the card out, mount, and modify the settings on another computer.

It does boot from an SD card. The camera looks identical to a Wyzecam V2 (I think identical in all but name basically). Any idea what I'd be changing once I got access to the file settings?

Does it have a factory reset button? I can't remember if that even works with the hacked cameras.

It does have a physical button on the back but it doesn't seem to take it when I try and reset it. I think withdrawing the SD card allows it the run on the original camera firmware although, in its present state, I'm unsure if its still running off the SD card or not, I guess so seeing as it's showing up as a device in the home app.

@Fookes74
Copy link
Author

Fookes74 commented Jun 8, 2023

Erase the sdcard and pull a fresh Hacks directory from git

Thanks for the response. I have tried that. Reflashing it seems to get the requisite LED light flashes but it has the same end result. I'm unable to get anything when keying in the IP address in URL. I'm therefore unsure whether it's worked or not.

@jmtatsch
Copy link
Collaborator

jmtatsch commented Jun 8, 2023

No need to reflash. Just a fresh filesystem and fresh folder from git. Camera should open a configuration wifi now if you haven't set up any Wi-Fi credentials.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants