Replies: 6 comments 5 replies
-
Hi, This script is quite basic because I only had 2 weeks to play with this inverter and dongle. But to answer your questions:
|
Beta Was this translation helpful? Give feedback.
-
Thanks, If you give me access to the Wiki I can add some more information from my first analysis. I can help document what I've learned so far. I don't think the Wiki followed the fork. But, better I document in your Wiki. I was not aware that the app communicated directly with the inverter, I just assumed it fetched data from the cloud. Interresting. The Solplanet app shows daily, monthly graphs of data. Hopefully it fetch it locally. Which app did you use? Solplanet? My speculation on 1883 is that the inverter send data to the cloud using MQTT. Since this is same supplier as Zeversolar, it is likely so. /M |
Beta Was this translation helpful? Give feedback.
-
I used the Aiswei app (before they switched to the Solplanet app around jan). To be able to communicate directly without the cloud, you need to go to the local mode (from the login screen). As for the fetching, I've only been able to retrieve current stats but you can easily log in a database or, the way I've done it, in home assistant. |
Beta Was this translation helpful? Give feedback.
-
I managed to install the old application and run a few more tests. Not soo much more discovered, only some more documented. The |
Beta Was this translation helpful? Give feedback.
-
I saw your changes. Nice work! I have a couple of questions tho. I remember some stuff from my reverse engineering attempts and just want to make sure it's the same for you.
Other than that, great job. The |
Beta Was this translation helpful? Give feedback.
-
Hello! Thank you for the great work. Some conclusions about /fdbg.cgi. POST request to fdbg.cgi with "{"data":"0303145000018009" }" returns 0303020040c074. The query "0303145000018009" appears to be a set of hex codes without an "x" at the beginning. Thus, first byte 03 = x03, second 03 = x03, etc... In this case it looks like a standard request to a modbus server. According to the Aiswei (Solplanet) documentation, the format of the request to the inverter to read the holding register is function code: 0x03. Request: 03 03 14 50 00 01 80 09 Response: 03 03 02 00 40 c0 74 As long as there is no error there is nothing to decode In summary, a request was sent to read register 5200 Grid Code and a response containing the type of Grid Code EN 50549-1 was received |
Beta Was this translation helpful? Give feedback.
-
Thanks for the amazing work. I've been exploring the endpoints/scrips you provided and want to learn how they were found.
In particular I would like to find endpoints/scripts for collecting historical data.
The WiFi dongle should have at least the capability to store up to 3-days of data according to sales information. Therefore it would be interesting to know if you have additional endpoints/scripts that are yet to discover.
Also, I notice that port 1883 seems to be exposed. 1883 is normally for MQTT.
1.)
Can you please share any documentation you have?
2.)
Can you please share any reverse engineering insights you may have?
3.)
Do you know if there is an endpoint/script for historical data?
4.)
Do you have any insights on this WiFi dongle and MQTT?
BR, /M
Beta Was this translation helpful? Give feedback.
All reactions