Keep calm and follow the procedure!
Warning: The method need to disassemble the camera and it brokes warranty.
For now this is it, I'm working on supporting more cameras.
Model Name(s) | Picture | Model Type | Uart |
---|---|---|---|
MJXJ03CM | IPC003 | uart | |
MJSXJ01CM | IPC003 | uart | |
MJSXJ02CM | IPC009 | uart | |
MJSXJ03CM | IPC007A | uart | |
MJSXJ05CM | IPC019 | uart | |
MJSXJ06CM | IPC021 | uart | |
MJSXJ09CM | IPC029A | uart |
Feature | Telnet Server | Onvif Server | RTSP Server | SSH Server | Web Configuration Server |
---|---|---|---|---|---|
MJXJ03CM | [x] | ||||
MJSXJ02CM | [x] | [x] | [x] | [x] | |
MJSXJ05CM | [x] | [x] | |||
MJSXJ06CM | [x] | ||||
MJSXJ09CM | [x] |
- According the model name and model type, download the rootfs_new.bin to sdcard (32GB, formated single partition with FAT32) then put into camera.
- Wire out the UART and connect the uart of the camera via USB2TTL (115200, 8n1)
- Stop uboot via keeping 'Enter' pressed then power up the camera.
- Flash the hacked rootfs, enter the following commands after the prompt 'SigmaStar #' or 'GM #' of uboot shell.
MJSXJ02CM
fatload mmc 0:1 0x21000000 rootfs_new.bin
sf probe
sf erase 0x260000 0x674000
sf write 0x21000000 0x260000 0x674000
reset
MJSXJ05CM
fatload mmc 0:1 0x21000000 rootfs_new.bin
sf probe
sf erase 0x250000 0x69E000
sf write 0x21000000 0x250000 0x69E000
reset
MJSXJ06CM
fatload mmc 0:1 0x21000000 rootfs_new.bin
sf probe
sf erase 0x250000 0x69E000
sf write 0x21000000 0x250000 0x69E000
reset
- enjoy the firmware with telnet enabled
unzip the ipcxx_hacks.zip to sdcard