The telnet root password depends on the device firmware, not on the processor.I am stucked login HI3518 processor ipcam through telnet.
They don't seem to be publishing a download of that version of firmware any more - it's been superseded by the 6.1.44.3 version.firmware version S2L55M_IMX124_X_5.1.35.2 longse...anybody has any idea?
They don't seem to be publishing a download of that version of firmware any more - it's been superseded by the 6.1.44.3 version.
Do you have a copy you could attach?
Each of the Herospeed firmware versions that I've looked at has a different telnet password.
And the newer 7.x series of firmware has a new 'telnet switch' facility to enable telnet access, via a camera-specific-derived password.
They don't seem to be publishing a download of that version of firmware any more - it's been superseded by the 6.1.44.3 version.
Do you have a copy you could attach?
Each of the Herospeed firmware versions that I've looked at has a different telnet password.
And the newer 7.x series of firmware has a new 'telnet switch' facility to enable telnet access, via a camera-specific-derived password.
So much for their updated security protection. Dohh - overflow carelessness.Bypass PoC, by making new pwd and then start telnetd.
So much for their updated security protection. Dohh - overflow carelessness.
Well done for finding that.
Have you been in contact with Herospeed about this vulnerability? Their firmware is used on quite a few brands of camera.
There is another simple way to permanently disable the Lucky787 security mechanism that you might like to try for fun.
On power-up, the telnet daemon is active for several seconds before TelnetSwitch is started up and kills it.
That gives plenty of time to login over telnet as root with the cracked password from the hash in the published firmware.
Then just 'mv' TelnetSwitch' or replace with your own and it never kills telnetd again.
You are right there! But my Chinese also needs improvement.besides, they can't spell either.
Funny that you saying Hik, noted the same in both GUI and binary protocol..You are right there! But my Chinese also needs improvement.
No different from Hikvision - not good to mis-spell program names.
That firmware doesn't have the rootfs or kernel in it, so the telnet password isn't available as far as I can see.Please if anyone knows the user and password for telnet to HW0041-2 Two Way Audio Alarm 2 Megapixel 1080P.
I suspect that 'debug mode' would somehow need to be activated.I tried on port 12990 not responding in putty.