Skip to content

Firmware m0700

mefistotelis edited this page Sep 13, 2021 · 8 revisions

Table of Contents

Target
Purpose
Versions
Structure
Boot process
OS and Libraries
Flashing
Interfaces

Target

The module programs a Wi-Fi controller chip. Location of this chip:

Purpose

The Wi-Fi controller acts as a host, allowing clients to connect to it. A connected client can receive live feed video from the drone, and exchange DUML packets, including telemetry data and control commands.

Versions

Below are known version of the module.

Marking Packages Timestamp Overview
TODO

Structure

Specifics of the module structure changes between products.

Flash storage map for WM301 Wifi Repeater

Map of the NAND flash memory is as follows:

Offset Description Content
0000000 U-boot u-boot partitions
0020000 Kernel uImage; the Linux Kernel normally used for booting
03f0000 Root Filesystem
07f0000 Art Boot bitmap image
0800000 End of flash

Boot process

No analysis of the booting procedure were performed.

OS and Libraries

The module uses OpenWRT as its firmware, with additional code which makes it transfer video feed and data.

Flashing

The OpenWRT project is the best place for finding flashing information for specific Wi-Fi chips:

Interfaces

Ethernet over Wifi

Connecting to the Wifi interface exposed by the device enables TCP connectivity to the chip, and in some products, also to other chips. Specific services available depend on specific device and firmware version. Since OpenWRT provides a lot of packages in its repositories, it is possible to configure the opkg tool and use bridged connection to install additional services, including web interface.

Known services available in unmodified products are listed below:

The Wifi chip is available at IP address 192.168.1.2. Exposed ports:

  • SSH at port 22, login credentials are root:19881209,

The Wifi chip is available at IP address 192.168.1.1. Exposed ports:

  • SSH at port 22, login credentials are root:19881209,

The Wifi chip is available at IP address 192.168.1.2. Exposed ports:

  • FTP at port 21, login credentials are root:Big~9China; provides full access in FW up to v01.06.0080, chrooted access in newer,
  • SSH at port 22, login credentials unknown; only available if FW up to v01.06.0080,
  • Telnet at port 23, login credentials unknown; only available if FW up to v01.06.0080,

Debug serial interface

The serial interface can be used to access shell on the OpenWRT Linux. It allows both input and output. Service pads which allow access to it are named as follows:

  • in WM301 Wifi Repeater board, the names are UART_RX, UART_TX and GND.

Transmission configuration is 115200 8N1. It uses 3.3V logic.

Clone this wiki locally