-
Notifications
You must be signed in to change notification settings - Fork 7
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Breaking changes to Wyze API #9
Comments
I was able to work around this with some DHCP / DNS and a slight edit of
Full Log of Update
|
@mandusm Are you redirecting s3-us-west-2.amazonaws.com to your local IP address using DNS/DHCP spoofing or similiar? It's also interesting that they now support http. I remember it wasn't working before which is why you needed to do https. |
can confirm, working, I used dnsmasq on my local openwrt router and was able to update the WYZEDB3. You must also use port 80. |
Thanks, all, for putting the time into this. I'm going to work on packaging this into something more universal / distributable. |
@elahd If you make a PR of this I can test it out and merge it into the master repo. |
I guess for people with blubs/sockets they should convert theirs into tasmota compatible and forget this mess forever. |
Hi, apologies for the slow response. I've been thinking about how we could build an integrated solution for WyzeHacks and the best way would be like they do in It's about 3 hours worth of work for me to do this, but I am weary of building it, since I have no doubt Wyze is tracking this repo, and for them to fix this, they quite simply just need to add |
Does anyone know if the workaround is still viable? I'm thinking of trying this but if wyze has already excluded http then there is no point. Also, the referenced lines in wyze_updater.py are no longer valid, it looks like that file has undergone some revisions since the workaround was described. |
The OTA method is pretty much dead now. I think this project finally gain
their attention. Even if we manage to find a new security hole, fixing it
is just a matter of time.
As owner of this project I feel bad, but as a general user Im glad they
started looking into security issues. So it might not be a bad thing.
…On Fri, Aug 20, 2021, 12:07 Kevin Jones ***@***.***> wrote:
Does anyone know if the workaround is still viable? I'm thinking of trying
this but if wyze has already excluded http then there is no point. Also,
the referenced lines in wyze_updater.py are no longer valid, it looks like
that file has undergone some revisions since the workaround was described.
—
You are receiving this because you commented.
Reply to this email directly, view it on GitHub
<#9 (comment)>, or
unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAZNWD3LLSD3RTOL7BMGBGDT52RYNANCNFSM5AKLOBCQ>
.
Triage notifications on the go with GitHub Mobile for iOS
<https://apps.apple.com/app/apple-store/id1477376905?ct=notification-email&mt=8&pt=524675>
or Android
<https://play.google.com/store/apps/details?id=com.github.android&utm_campaign=notification-email>
.
|
Such a bummer. I just tried the process also, and getting the same |
Looks like dns spooing works with the V3 up to firmware 4.36.3.18, after that it breaks. Looking at the contents of the firmware upgrade .tar's , would there be a way to intercept and stop the upgraderun.sh file? And flash the partitions manually, after modification... effectively blocking OTA updates, something like replacing flashcp and flash_eraseall binaries with dummies holding up the script execution... @HclX I know you must be super busy, would you have any info, notes or comments on this? this won't help the newer cameras that force https and the locked bootloader, but will continue the viability for existing models. |
@gtxaspec Yes, this year is quite busy for me so I haven't spent too much on wyzehack. Here is what I have regarding the current situation:
|
I just tried the DNS redirect method (changing line 257 to Rebooting the camera seems to return to old RTSP firmware (4.61.0.3) Am I doing something wrong, or is this method now also likely dead? |
SUCCESS!! I was able to OTA-update from the Wyze-Official RTSP firmware (4.61.0.3) to this firmware using the DNS method and the python uploader with a rather large caveat: the HTTP server built into the python script didn't seem to be responding to the URL request with the firmware file. I, instead, set up a separate HTTP server on my device with the directory structure of the "authorized" url ( EDIT:. It seems like the latest build of the updater script correctly listens on the HTTP port, so you can use this command Then, the default login should be: HclX/WyzeHacks#112 (comment) |
Either you left out that you modified WyzeHacks or what you're saying doesn't make sense. v3 RTSP firmware versions are not supported under the current script (https://github.com/HclX/WyzeHacks/blob/master/wyze_hack/main.sh). It should show have an error in the installlog saying "WyzeHack: Wyze version not found!!!" |
Thanks for all this! Without it I wouldn't have managed to switch my two Wyze plugs over. Both were original WLPP1 running 1.2.0.80 firmware. I had initially DNS-spoofed Afterwards I looked at the logs of my DNS (AdGuard Home) and realized why it wasn't working initially; the plugs were requesting the DNS with the port included! Not sure if running with |
Just for reference.. I had/have some old pre 2021 plugs (that were running 1.2.0.56).. tried it, got the plugs to accept the firmware using --ssl, dns spoofing, etc... and.... they worked... with V0.4... (I thought they had bricked, but then when I hooked up after cracking them open, I saw the esp2ino AP).. |
It looks like Wyze killed WyzeUpdater's approach to loading third party firmware. See elahd/esp2ino#16 (comment). Thoughts?
The text was updated successfully, but these errors were encountered: