Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

RTSP stream not available #15

Open
tsipizic opened this issue Jun 8, 2024 · 3 comments
Open

RTSP stream not available #15

tsipizic opened this issue Jun 8, 2024 · 3 comments

Comments

@tsipizic
Copy link

tsipizic commented Jun 8, 2024

I bought a brand new camera and followed the steps:

  • Ran the exploit on recovery mode
  • Enabled telnet service
  • Add exit on mydlink_watchdog.sh to block cloud functions
  • Setup wifi credentials(WIFI_SECURITY_TYPE,WIFI_SSID,WIFI_PWD) and register_st = 1
  • Reboot

All these without using the mydlink app. The problem is that, while camera connects successfully to my AP, the only open port is 53, RTSP and telnet ports are closed and red light is flashing. Telnet and RTSP are only available when booting in recovery mode.
Do I need to setup anything extra in SystemConfig.ini, is there any initialization with mydlinkapp needed?
I also tried downgrading to firmware 1.01 but nothing changed. Any help is appreciated!

@comtom
Copy link

comtom commented Aug 30, 2024

Hi, the rtsp endpoint is available in stock firmware, just make sure you use the camera pin as password and that you use tcp as transport. Camera pin is printed on the label located under the camera.

ffplay -rtsp_transport tcp -i rtsp://admin:<CAMERA_PIN>@<CAMERA_IP>:554/live/profile.0/video

@tsipizic
Copy link
Author

RTSP port is closed

@comtom
Copy link

comtom commented Aug 30, 2024

I can confirm the command above is working for 4 cameras (DCS-6100LH), on version 1.04.05(3.5.23-b01)

also port 554 tcp is open:

$ nmap 192.168.3.6                                                                      
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-08-30 12:05 CEST
Nmap scan report for 192.168.3.6
Host is up (0.027s latency).
Not shown: 996 closed tcp ports (conn-refused)
PORT     STATE SERVICE
554/tcp  open  rtsp
6000/tcp open  X11
7000/tcp open  afs3-fileserver
8080/tcp open  http-proxy

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants