I bought a Smartwares CIP-39220 IP Cam and its not that great so far. It only works on Android/IOS devices by default and the app (SW360) requires to have access to the Media and Location of my device. Also the cam doesn't work on a local network and requires internet access (to a Chinese server) to even display the video stream, this seems like a big security issue.
Because of the problems described above I tried to find the RTSP stream (or any other protocol) to get the cam working on just my local network.
The quality of the Cam is pretty good (1080p) in day and even night conditions.
Some info about the IP Cam:
Ports: 80, 64444 (Sadly no FTP or Telnet)
Firmware version: 2.0.27.0
The network paths I discovered so far:
Single image path: 192.168.1.115:80/snapshot.jpg (640x360)
RTSP Stream: rtsp://192.168.1.115:80/ch1_0.264 (Sadly requires a username/password which I don't have)
Bubble Stream: http://192.168.1.115:80/bubble/live?ch=0&stream=0 (Also requires username/password for handshake)
The API the cam is talking to: openapi.dvr163.com (Located in China)
I found a lot of use full information in this Github repository: github.com/maxious/c8915a436b532ab09e61bf937295a5d2
Its not exactly the same Cam but the software seems identical.
Does anyone have experience with bad IP Cams like this or even the software its running on? The only further step I know is Brute forcing the RTSP username/password and disabling full internet connection for the cam. But I'm not sure if that is the right step.
Edit: Trying to use plain text instead of the Github URL Because the page is huge.
Because of the problems described above I tried to find the RTSP stream (or any other protocol) to get the cam working on just my local network.
The quality of the Cam is pretty good (1080p) in day and even night conditions.
Some info about the IP Cam:
Ports: 80, 64444 (Sadly no FTP or Telnet)
Firmware version: 2.0.27.0
The network paths I discovered so far:
Single image path: 192.168.1.115:80/snapshot.jpg (640x360)
RTSP Stream: rtsp://192.168.1.115:80/ch1_0.264 (Sadly requires a username/password which I don't have)
Bubble Stream: http://192.168.1.115:80/bubble/live?ch=0&stream=0 (Also requires username/password for handshake)
The API the cam is talking to: openapi.dvr163.com (Located in China)
I found a lot of use full information in this Github repository: github.com/maxious/c8915a436b532ab09e61bf937295a5d2
Its not exactly the same Cam but the software seems identical.
Does anyone have experience with bad IP Cams like this or even the software its running on? The only further step I know is Brute forcing the RTSP username/password and disabling full internet connection for the cam. But I'm not sure if that is the right step.
Edit: Trying to use plain text instead of the Github URL Because the page is huge.