(i assume the recent CVE vulnerability will not work on it )
What's the chipset on that camera? i notice it uses uImage . It may let you get root by using a similar method used on the G0 cams.
There are many methods to get a Chinese cam to run as a European/english cam.
You would need full shell access or way to repack firmware or hardware flash.
Just get any version of Chinese firmware working on the cam. Then take it from there. Don't get too hung up on the version...
i Pm'd regarding having 2 admins. Also there are security issues in the web gui. You can get it to alter the ipc_db in ways that it should not allow. (i only stressed tested it to see if it would allow root access.)
Certain functions and restriction regarding users can be overridden from the...
also has files referencing hisilicon hi3518e chipset.
R2 is supported in leechers / other unpacker , but it does not unpack this digicap.dav. The keys/encryption is different.
keys are normally in davinci for decryption. You davinci in the .bin looks like a standard elf file (some davinci's are called davinci_bak) Yours is a straight elf file by the looks of it. Usually the keys are in there for decrypting the digicap.dav
i ran a quick hex edit on the the davinci...
Platform id is 136 unsupported
Were did you get the .bin file from ? Have you got root on the cam?
if you have root/access to davinci/deamon_fsp then you can pull the keys from it.(there is a davinci in that bin file you posted)