Skip to content

Flashing of WiFi Switch with a Raspberry Pi

Gianluca Sabella edited this page Sep 20, 2020 · 16 revisions

Background information

There are many similar devices made by the same big company (Tuya) and redistributed by 3rd parties companies (like Sonoff, AVATTO, ...). These devices are natively integrated with the Tuya cloud which can operate the device remotely. For example, from the cloud it's possible to upload a new firmware via OTA.

If you consider this to be unsecure and a kind of leakage in your home network, you can flash the device with a open source firmware (Tasmota) which can be operated locally on your network, does not require a cloud, and can be integrated locally with other system like Domoticz, Home Assistant, Alexa, Google.

Devices produced up to early 2020, could be flashed with a Tuya cloud simulator, e.g. tuya-convert. The vulnerability has been fixed and tuya-convert cannot works anymore (see #483).

If you want to flash the Tasmota firmware, you need to open the device and connect a serial device (like a Raspberry PI) to the test points. A bit of reverse engineering needs to be done to map the testing point to the ESP chip pins.

For the ESP pinout, you need to check the Espressif datasheet. See for example:

This page applyes to a specific device: DEVICE

Precondition

Configure Raspberry PI switching ttyAMA and ttyS0 serials

Follow one of these procedures to edit /boot/config.ini and /boot/cmdline.txt https://spellfoundry.com/2016/05/29/configuring-gpio-serial-port-raspbian-jessie-including-pi-3-4/ https://hallard.me/enable-serial-port-on-raspberry-pi/

In alternative, you can use any USB Serial devices or an Arduino serial

Connection

For this device the connection scheme is:

  • connect RPI GPIO 5V to pin 3 of 5V/3V converted
  • connect RPI GPIO TX to ESP serial RX
  • connect RPI GPIO RX to ESP serial TX
  • connect RPI GPIO GND to ESP GND

In order to make the reverse enginnering of the connection, you need to identify the test points and to follow the path up to the ESP pins. The test points are tipically always present in any device as they are used by the manufactor to flash the firwmare after the HW assembly. The test points shall allows therefore to power the chip (ESP 0 GND, +3.3 V), to connect to its serial (ESP GPIO TX, RX), to force the flash mode (ESP GPIO0) and to test that the button works properly. Indeed we need six test points. In this example...

Device board

1 First observation: you recognize the black square chip; in this example it's ESP8285.

Zoom on the test points

2 The test points (6 in this example) are the circles plate in the bottom right part. Let's call the A, B, C, D, E, F.

To follow the path up the ESP chip, you need to follow some solders on the back plate. See the attached photo. Note that this photo is left-right flip so that it's easy to correlate the points in which the connection move from the front to the back plate. These points are holes which are visibible in the same position on both plate. 3

Follow the test points

scheme

The pin A is clearly solded with the button; there is no further need to sold this pin.

The pin F is clearly connected to the main ground (the light red present almost everywhere in the board)

The other pins need a bit of attenction and checks.

The result is:

  • A: one of the ESP GPIO
  • B: U0RXD Serial receive
  • C: U0TXD Serial transmit
  • D: GPIO0 needed to force the flash mode
  • E: VDDA +3.3V
  • F: GROUND 0V

Connection to the Rasperry Pi serial

Here a connection scheme 4

A small caveat. It is not possible to connect the Raspberry +3.3V to the ESP VDDA. It will not work. You need to find another power source. Instead of powering directly the ESP chip, I choosed to connect the Raspberry +5V to the device internal power converter. In the photo it's the black chip AMS1117, pin Vin http://www.advanced-monolithic.com/pdf/ds1117.pdf

Procedure step by step

  1. switch on the device with ESP GPIO0 shortcut on GND; this can be done by pressing the device button
  2. run esptool and flash the firmware

esptool.py erase_flash

esptool.py write_flash -fm dout 0x0 tasmota.bin

Post firmware flashing

There a couple of additional step to configure your new tasmota devices. For example you need to explain to the firware what is the expected action to execute when the button is pressed (i.e. seitch the relee). There is a procedure in the Tasmota wiki which explain how to reverse engineering the internal device GPIO connections. Once you have done, you can create a template to be uploaded to any equivalent device. For this specific device the template is: {"NAME":"Switch","GPIO":[0,0,0,0,0,17,0,0,21,0,0,0,0],"FLAG":0,"BASE":18}