Rooting K9608-2W
Let's say you have one of these and you want shell access for some reason, like setting the date & time programatically. By adding a couple magic files to a USB mass storage device, connecting it to your NVR and rebooting, you will be able to login via telnet.
Login to the web user interface of your NVR, go to Settings (wrench and screwdriver icon). If you see the following info listed in the DevInfo tab, then these instructions should work for you. This may work with other software versions too but no promises.
Dev model | K9608-2W |
HW version | 2.1.0 |
SW version | 2.7.13.0_22922330 |
Reldatetime | 2018/10/26 10:58 |
Grab a thumb drive or whatever USB mass storage device is handy. Make sure the partition table is simple and has fat32 as the first primary partition. This is usually the default setup for a new device so you probably don't have to do anything. Mount it and get started making the three files as below in the top level directory.
me@here:/media/me/SANDISK$ echo 1000000001 > enable_log_forever
me@here:/media/me/SANDISK$ cat <<EOF>dvr_app
#!/bin/sh
/usr/sbin/telnetd &
exec /media/usb1/dvr_app_chain "\$@"
EOF
me@here:/media/me/SANDISK$ cat <<EOF>dvr_app_chain
#!/bin/sh
umount /root/dvr_app/dvr_app
exec /root/dvr_app/dvr_app "\$@"
EOF
me@here:/media/me/SANDISK$
Unmount/eject, pop it in the NVR, reboot the NVR, wait a bit and then telnet to it using the same IP or hostname you used to get to the web interface. Login with username root and password j1/_7sxw
me@here:~$ telnet nvr-host
Trying 192.168.31.337...
Connected to nvr-host.
Escape character is '^]'.
(none) login: root
Password:
Welcome to HiLinux.
# uptime
05:42:38 up 2:35, 1 users, load average: 13.88, 12.32, 11.89
# ls /
a.out bin etc linuxrc mnt oem root sys usr
a2.out dev lib media nfsroot proc sbin tmp var
#
One of the startup scripts contains the following snippet:
if [ -e $MOUNT_DIR/enable_log_forever ];then
echo "enable log2 found."
rv=$(cat $MOUNT_DIR/enable_log_forever)
if [ "$rv" == "1000000001" ];then
if [ -e $MOUNT_DIR/dvr_app ];then
echo "mount bind dvr_app."
mount --bind $MOUNT_DIR/dvr_app /root/dvr_app/dvr_app
fi
In short, if the file enable_log_forever
exists and contains 1000000001
then bind-mount dvr_app
from the USB device over the top of the normal /root/dvr_app/dvr_app
before running it later in the same startup script.
The shell won't allow us to unmount dvr_app
from inside of the script running as that name, so we pass off execution to an arbitrary script called dvr_app_chain
directly from the USB mountpoint. From there, we can unmount our dvr_app
and run the orriginal with the arguments that were passed along the way. Any additional commands that we want to run can be added to either script.
One side effect is that logs will be written to your USB device. Rebooting without this USB device present will revert to running normally without telnetd.
- Kill run_IOTDaemon.sh. It's the script responsible for spawning IOTDaemon once a minute. This service reaches out to ngw.dvr163.com offering remote access to your video along with all sorts of other controls, including a reverse shell.
- Change the root password. Using bind-mount, you can set up a passwd file on your USB mass storage device.
- Run dropbear instead of telnetd.
- Update the squashfs with all of your changes so that you don't depend on the USB mass storage device any more. For extra credit, add an NFS mount to hold larger packages.
- Run ntpd. The clock drift on this thing is terrible. The built in mechanism for ntp is to stop recording, update clock, then start recording again. This is appropriate for a big time shift, but not so hot for regularly maintaining time sync.
Please post comments with suggestions or requests for this document. Have a device you want root on and don't mind sending one to me? Tweet at @octosavvi.
Hmm, I'm curious about your version of run_app.sh. The one I extracted from FWHI36D_20200821_W-NVR_K8208-W_3_0_8_3_9013160200.rom has ./app.out on line 175 but the error above shows it on 176. Could there be a change in run_app.sh that is breaking the bind-mount? Since you have TTL UART set up, I suggest booting without the USB drive attached, get your UART shell connected, plug in the USB drive, then run
/opt/run_app.sh
. It will probably throw some errors and die, but when it is done, it would be very interesting to see the output ofgrep bind /proc/mounts; ls -l /opt/app/app.out /media/usb1/app.out
.While you have a shell open, you can verify that the interpreter is available like so:
If your output doesn't look remotely similar to the above, or busybox doesn't have -rwx at the beginning of the modes (since you are running it as root, the owner of the file), then that is totally a problem. I'm betting your output will match because many /etc/init.d/ scripts are using the same interpreter and working well enough to get run_app.sh started.
And while I'm throwing out wild theories, would you happen to be editing app.out and app.out-chain on your USB drive in Windows? If so, any chance the line termination is \r\n?