Git Product home page Git Product logo

Comments (44)

revenant-81 avatar revenant-81 commented on August 16, 2024

Most likely the case. Wyze will likely disable the ability to view a camera that doesn't meet minimum firmware requirements in their app, leaving us to decide on either choosing the RTSP route (with NFS) and removing the camera from the Wyze ecosystem and using third party applications or staying within the locked-down Wyze ecosystem.

from wyzehacks.

Semag avatar Semag commented on August 16, 2024

That super bums me out because I have a whole home brew person detection built on the motion capture images the Wyze cams captures.

I would feasibly move to Dafang or RTSP but I don’t think either maintains the on camera motion detection, which saves the ever present wireless bandwidth of rtsp monitoring.

unless someone else is aware of a way to offload the motion detection to the cameras and bring in extra processing only on demand when something is happening?

from wyzehacks.

nijhawank avatar nijhawank commented on August 16, 2024

If your Wyze cams have already been jailbroken with Wyze hacks, do the hacks survive the update to recent firmwares?
I don’t remember exactly but I had some old firmware (v3) installed and jailbroken and updated to 4.36.2.5 and the hack survived but I haven’t updated since as the setup is very stable

from wyzehacks.

Semag avatar Semag commented on August 16, 2024

I believe the newer ones that change the root password definitely kill the Wyze hacks.

from wyzehacks.

mrlt8 avatar mrlt8 commented on August 16, 2024

Most likely the case. Wyze will likely disable the ability to view a camera that doesn't meet minimum firmware requirements in their app, leaving us to decide on either choosing the RTSP route (with NFS) and removing the camera from the Wyze ecosystem and using third party applications or staying within the locked-down Wyze ecosystem.

Could we just spoof the firmware version on the camera?

For compatibility, we may need to be on a 4.x.6.241+ firmware that uses the Connect_ByUIDEx method for DTLS/authkey support if they decide to deprecate Connect_ByUID_Parallel.

from wyzehacks.

nijhawank avatar nijhawank commented on August 16, 2024

I believe the newer ones that change the root password definitely kill the Wyze hacks.

Is it possible to apply a patched updated firmware manually (via telnet) while we are still jail broken

from wyzehacks.

GrumpyMeow avatar GrumpyMeow commented on August 16, 2024

I'm also trying to modify the firmware file. I suspect that on recent firmwares Wyze implemented some additional verification.
I suspect a sign/hash is appended to the firmware file (64 bytes). At this moment i don't see which technique is used.
This is probably also the reason that Wyze is pushing the new firmwares.

from wyzehacks.

jk111 avatar jk111 commented on August 16, 2024

@nijhawank you can do an in-app upgrade on V3 cams from your current 4.36.2.5 to 4.36.3.18 and the hack will survive. I was running on 2.5 for a long time like you and decided to try this week. 3.18 is that intermediate version Wyze requires before going to latest. Upgrading from 3.18 to latest will kill the hack. If you want to test you can always downgrade using SD card and apply the hack again. I've been doing it by downgrading to 4.36.0.280 -> apply hack -> upgrade in app to 4.36.3.18.

from wyzehacks.

jk111 avatar jk111 commented on August 16, 2024

Has anyone been able to get the hacks version 1 to apply to v3 cams? I'm having a hard time getting the bootloader unlock image to install on the camera. wyze_updater.py shows unauthorized operation. SD card install logs show bootloader checksum mismatch.

from wyzehacks.

revenant-81 avatar revenant-81 commented on August 16, 2024

I had an experience where one of my recently purchased V3s could not be hacked regardless of firmware version, but a V3 purchased back from initial release was. The more recent V3 had a MAC starting with "D0:xx:xx" and the initial release has a MAC of "2C:xx:xx"

from wyzehacks.

jk111 avatar jk111 commented on August 16, 2024

Interesting, I've been trying on a newer v3 with MAC "7c". I will try with my older v3 with MAC "2c"

from wyzehacks.

jk111 avatar jk111 commented on August 16, 2024

Same issue

Traceback (most recent call last):
File "./wyze_updater.py", line 433, in
args.action(creds, args)
File "./wyze_updater.py", line 303, in update_devices
push_update(creds, dev_info['product_model'], mac, url, md5, args.firmware_ver)
File "./wyze_updater.py", line 159, in push_update
return run_action(creds, model, "upgrade", mac, {"url": update_url, "md5": md5, "model": model, "firmware_ver": ver})
File "./wyze_updater.py", line 153, in run_action
return device_api(
File "./wyze_updater.py", line 132, in device_api
raise WyzeApiError(rsp)
main.WyzeApiError: {'ts': xxxxx, 'code': '3005', 'msg': 'UnauthorizedOperation', 'data': {}}

from wyzehacks.

revenant-81 avatar revenant-81 commented on August 16, 2024

I followed the post #138 (comment) to get Wyzehacks on the V3 last week. It required spoofing the DNS addresses for specific URLs based on device type and using the "WyzeUpdater.py"

from wyzehacks.

Semag avatar Semag commented on August 16, 2024

Yeah I can confirm for @jk111 that my v3 has a max starting with 7C:73:B2 so the DNS spoof will work there. It does need to be on version 4.36.2.5 or earlier though.

from wyzehacks.

nijhawank avatar nijhawank commented on August 16, 2024

@nijhawank you can do an in-app upgrade on V3 cams from your current 4.36.2.5 to 4.36.3.18 and the hack will survive. I was running on 2.5 for a long time like you and decided to try this week. 3.18 is that intermediate version Wyze requires before going to latest. Upgrading from 3.18 to latest will kill the hack. If you want to test you can always downgrade using SD card and apply the hack again. I've been doing it by downgrading to 4.36.0.280 -> apply hack -> upgrade in app to 4.36.3.18.

So what you are saying is that we can always downgrade from any latest version and reapply the hack? Doesn’t the new version block downgrades?

from wyzehacks.

Semag avatar Semag commented on August 16, 2024

Up until 4.36.3.18 or so (not sure about the newest versions) you can still downgrade via the SD Card method. I'm not sure if they're going to block that moving forward.

from wyzehacks.

endertable avatar endertable commented on August 16, 2024

The real big question is: is there a way to block them from updating the cam firmware? Is updating the VER.txt file enough or does it do other checks?

from wyzehacks.

Semag avatar Semag commented on August 16, 2024

Don’t you think if we put in the amazon s3 bucket dns redirect they won’t be able to remotely update? Unless they change the software location

from wyzehacks.

mrlt8 avatar mrlt8 commented on August 16, 2024

The real big question is: is there a way to block them from updating the cam firmware? Is updating the VER.txt file enough or does it do other checks?

You mean app.ver? I don't think it does other checks, but they changed the connection method to use DTLS a couple of versions ago due to the tutk vulnerability and the KVS stuff for WebRTC streaming, so those could break if on an older build?

Don’t you think if we put in the amazon s3 bucket dns redirect they won’t be able to remotely update? Unless they change the software location

Don't the cameras go into a reboot loop if they can't phone home? I wonder if they'd do the same if unable to download the firmware..?

from wyzehacks.

gtxaspec avatar gtxaspec commented on August 16, 2024

perhaps if we can block new updates, flash the new firmware manually, so the camera doesn't reboot automatically, then re flash the modified wyzehacks firmware, then wyzehacks will only require old firmware to initially install... hmm...

from wyzehacks.

endertable avatar endertable commented on August 16, 2024

The real big question is: is there a way to block them from updating the cam firmware? Is updating the VER.txt file enough or does it do other checks?

You mean app.ver? I don't think it does other checks, but they changed the connection method to use DTLS a couple of versions ago due to the tutk vulnerability and the KVS stuff for WebRTC streaming, so those could break if on an older build?

Don’t you think if we put in the amazon s3 bucket dns redirect they won’t be able to remotely update? Unless they change the software location

Don't the cameras go into a reboot loop if they can't phone home? I wonder if they'd do the same if unable to download the firmware..?

So does anyone know how we can update the app.ver file, especially on v3 because I believe that is a read only mount.

from wyzehacks.

endertable avatar endertable commented on August 16, 2024

I like this flash/apply new firmware manually idea. Any idea how to do this?

from wyzehacks.

nijhawank avatar nijhawank commented on August 16, 2024

Yesterday I tried these experiments:
Experiment 1:
0. I had v3 on 4.36.2.5 with Wyze hacks

  1. Restored to original 4.36.2.5 with SDcard recovery method to remove wyzehacks
  2. modified wyzehacks to use the rootfs from 4.36.8.15 (latest firmware available, it’s rootfs version is 4.36.3.19)
  3. Using dns spoofing
  4. Installed wyzehacks
    Result- I confirmed the rootfs update from the Wyze app but I couldn’t telnet.

Experiment 2:

  1. Restored to latest 4.36.8.15 (latest) using SDCard recovery
  2. Downgraded back to 4.36.2.5 using SD card recovery
  3. Reinstalled wyzehacks using dns spoof
    Result- downgrade is always possible, it seems SDcard recovery doesn’t block downgrades as the boot loader might not have such checks and this boot loader might not be patchable by Wyze

from wyzehacks.

nijhawank avatar nijhawank commented on August 16, 2024

@endertable app.ver inside rootfs could be changed by changing rootfs. It should anyways be possible to apply such patched rootfs by downgrading to 4.36.2.5 using SDcard recovery and then using a modified wyzehacks that also uses modified rootfs with patched app.ver

from wyzehacks.

endertable avatar endertable commented on August 16, 2024

@endertable app.ver inside rootfs could be changed by changing rootfs. It should anyways be possible to apply such patched rootfs by downgrading to 4.36.2.5 using SDcard recovery and then using a modified wyzehacks that also uses modified rootfs with patched app.ver

Thanks, the only issue I see is when Wyze starts forcing the updates, I imagine that as soon as the Cam boots and sees it is not using the latest update, it will automatically update and at that point not allow Wyze hacks to work anymore, so even if you downgrade with SD card, it will automatically update upon the reboot to a new minimum version.
I liked @gtxaspec idea of us manually updating to newminimum version, but that would mean Us dissecting the firmware and running all the flash_erase and flashcp commands ourselves, probably through a script. Question is, does anyone know how to dissect the wise firmware bundles?

from wyzehacks.

virmaior avatar virmaior commented on August 16, 2024

does it really fail if it can't phone home? no one can operate (as in leave it recording to the SD card) these without them connected to the internet?
If so, could we spoof the phone home and block access to AWS?

from wyzehacks.

mrlt8 avatar mrlt8 commented on August 16, 2024

I think a couple of my cameras auto updated to the latest firmware...

from wyzehacks.

virmaior avatar virmaior commented on August 16, 2024

What models? What firmware did it update to? Estimate as to when it happened?

from wyzehacks.

beaverdude avatar beaverdude commented on August 16, 2024

Feb 15, 02:15 EST, autoupdated to 4.9.8.501, update was pushed thru s3.us-west-2.amazonaws.com

Does anyone know the good camera brand\model that can write to nfs on stock firmware without a shaman dance? It turns out like wyze is going to a trash bin very soon.

from wyzehacks.

mrlt8 avatar mrlt8 commented on August 16, 2024
  • v2
  • 4.9.6.241 > 4.9.8.501
  • sometime in the past 12hrs maybe?

FYI, I'm running the beta app to test compatibility with my wyze bridge, and noticed some of the cams had DTLS turned on.
Some of my cams remained on 4.9.6.241, while the one on the latest firmware also remained on 4.9.8.860

from wyzehacks.

FiveLeavesLeft avatar FiveLeavesLeft commented on August 16, 2024

from wyzehacks.

virmaior avatar virmaior commented on August 16, 2024

I have 5 V3s. It looks like it just forcibly updated 4 of them which were on 4.36.0.252 to 4.36.3.18.
The one on 4.36.2.5 has not been updated yet.

4.36.3.18 still has the same password, functioning telnet, and functioning boa...
Rather unhappy about this. Will probably switch to RTSP firmware and use stream capturing.

10 minute later it forcibly updated them 4.36.3.19. I've now removed their subnet completely from the internet to avoid further updates.

from wyzehacks.

virmaior avatar virmaior commented on August 16, 2024

2022-02-19 was able to do a manual downgrade to 4.36.2.5 and reapply the hack for 4 cameras that autoupgraded. Steps involved:

  1. microSD card downgrade (used a 16gb card) to 4.36.2.5 (also considered 4.3.6.0.280 but even though that was the version they came, it seemed to have trouble detecting larger cards).
  2. wyze_updater.py with DNS spoofing of s3.us-west-2.amazonaws.com to install wyze hack.
  3. took them offline
  4. corrected time from inside root / confirmed video was still being recorded
    (don't have any live access to the cameras but they are on an isolated wifi network).

from wyzehacks.

Vendo232 avatar Vendo232 commented on August 16, 2024

How can we block the update?

If I block this domain in my OpenDNS and in my router would that work?

s3.us-west-2.amazonaws.com

from wyzehacks.

virmaior avatar virmaior commented on August 16, 2024

@Vendo232 that wasn't the domain they used at least for V3 updates. My V3s were on a subnet where I left that domain spoofed and they were still able to "upgrade" them remotely.

from wyzehacks.

cessna avatar cessna commented on August 16, 2024

Looks like we're dead in the water for now?

from wyzehacks.

Vendo232 avatar Vendo232 commented on August 16, 2024

was able to reinstall Wyzehack and install HTTP stream hack for my use on Frigate. All 3 my Wyze V3 work now great.

here is the guide

https://github.com/Vendo232/wyze_v3_frigate_http_stream

from wyzehacks.

FiveLeavesLeft avatar FiveLeavesLeft commented on August 16, 2024

@Vendo232, that is awesome. Thank you so much for doing this and documenting it.

from wyzehacks.

Pcpro745 avatar Pcpro745 commented on August 16, 2024

Did we ever get a fix for this?

from wyzehacks.

gtxaspec avatar gtxaspec commented on August 16, 2024

If you can downgrade to 4.36.0.280, I have a method to modify the firmware and flash the latest stable release with telnet enabled, you need to have an SD card in the unit...it's not wyzehacks...yet, but you can run commands in telnet or a script on boot.

from wyzehacks.

endertable avatar endertable commented on August 16, 2024

If you can downgrade to 4.36.0.280, I have a method to modify the firmware and flash the latest stable release with telnet enabled, you need to have an SD card in the unit...it's not wyzehacks...yet, but you can run commands in telnet or a script on boot.

This sounds awesome, then I can upgrade to latest and get back online. 😀

from wyzehacks.

gtxaspec avatar gtxaspec commented on August 16, 2024

@endertable, if you are experienced try:

https://github.com/gtxaspec/wz_mini_hacks

from wyzehacks.

Vendo232 avatar Vendo232 commented on August 16, 2024

@gtxaspec what an update ! so no compilation is required now? I hope @FiveLeavesLeft will find time to update the stream hack for wz_mini_hacks!

will try today the new update on RTSP and LAN cable

from wyzehacks.

zshaozhong avatar zshaozhong commented on August 16, 2024

trying to revert my pan cam v1. but cannot find older firmware anywhere. anyone got a copy or download link? thanks

from wyzehacks.

Related Issues (20)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.