Hello all,
My VTO2111D-WP bricked during a firmware update and won't come back. It can't be seen by ConfigTool on port 3800, nor is port 23 or any other port accessible. It won't even respond to pings.
Here are the steps I have taken to try and fix it:
1. Followed all instructions in the Dahua IPC EASY unbricking / recovery over TFTP thread. The camera can see the TFTP files and tries to load them
2. For the firmware to reflash, I am using the Dahua Wiki firmware located here.
One problem - when using the standard commands for commands.txt, which are:
run dr
run dk
run du
run dw
run dp
run dc
The process fails before flashing all the files with the following output:
Client 192.168.1.108:1951 root\upgrade_info_7db780a713a4.txt, 1 Blocks Served
Client 192.168.1.108:1974 root\romfs-x.cramfs.img, 2118 Blocks Served
Client 192.168.1.108:1978 root\kernel-x.cramfs.img, 1207 Blocks Served
Client 192.168.1.108:3756 root\user-x.cramfs.img, 4496 Blocks Served
Client 192.168.1.108:1051 root\web-x.cramfs.img, 960 Blocks Served
Client 192.168.1.108:2470 root\failed.txt, 1 Blocks Served
If instead I specify writing each individual file like so:
tftp 0x82000000 romfs-x.cramfs.img; flwrite
tftp 0x82000000 kernel-x.cramfs.img; flwrite
tftp 0x82000000 user-x.cramfs.img; flwrite
tftp 0x82000000 web-x.cramfs.img; flwrite
tftp 0x82000000 pd-x.cramfs.img; flwrite
tftp 0x82000000 custom-x.cramfs.img; flwrite
tftp 0x82000000 .FLASHING_DONE_STOP_TFTP_NOW
sleep 5
I am successful with the following output:
Client 192.168.1.108:2077 root\upgrade_info_7db780a713a4.txt, 1 Blocks Served
Client 192.168.1.108:2099 root\romfs-x.cramfs.img, 2118 Blocks Served
Client 192.168.1.108:2651 root\kernel-x.cramfs.img, 1207 Blocks Served
Client 192.168.1.108:1359 root\user-x.cramfs.img, 4496 Blocks Served
Client 192.168.1.108:1801 root\web-x.cramfs.img, 960 Blocks Served
Client 192.168.1.108:3235 root\pd-x.cramfs.img, 31 Blocks Served
Client 192.168.1.108:3307 root\custom-x.cramfs.img, 9 Blocks Served
Client 192.168.1.108:3348 root\.FLASHING_DONE_STOP_TFTP_NOW, 1 Blocks Served
Client 192.168.1.108:2217 root\success.txt, 1 Blocks Served
However, the camera does not boot, can't be pinged, and isn't accessible via telnet or ConfigTool @ port 3800.
Does anyone have any words of wisdom for me here? Is this a typical error when trying to flash a hacked Chinese cam with an English firmware? If so, does anyone know where to get the chinese firmware for this camera?
My VTO2111D-WP bricked during a firmware update and won't come back. It can't be seen by ConfigTool on port 3800, nor is port 23 or any other port accessible. It won't even respond to pings.
Here are the steps I have taken to try and fix it:
1. Followed all instructions in the Dahua IPC EASY unbricking / recovery over TFTP thread. The camera can see the TFTP files and tries to load them
2. For the firmware to reflash, I am using the Dahua Wiki firmware located here.
One problem - when using the standard commands for commands.txt, which are:
run dr
run dk
run du
run dw
run dp
run dc
The process fails before flashing all the files with the following output:
Client 192.168.1.108:1951 root\upgrade_info_7db780a713a4.txt, 1 Blocks Served
Client 192.168.1.108:1974 root\romfs-x.cramfs.img, 2118 Blocks Served
Client 192.168.1.108:1978 root\kernel-x.cramfs.img, 1207 Blocks Served
Client 192.168.1.108:3756 root\user-x.cramfs.img, 4496 Blocks Served
Client 192.168.1.108:1051 root\web-x.cramfs.img, 960 Blocks Served
Client 192.168.1.108:2470 root\failed.txt, 1 Blocks Served
If instead I specify writing each individual file like so:
tftp 0x82000000 romfs-x.cramfs.img; flwrite
tftp 0x82000000 kernel-x.cramfs.img; flwrite
tftp 0x82000000 user-x.cramfs.img; flwrite
tftp 0x82000000 web-x.cramfs.img; flwrite
tftp 0x82000000 pd-x.cramfs.img; flwrite
tftp 0x82000000 custom-x.cramfs.img; flwrite
tftp 0x82000000 .FLASHING_DONE_STOP_TFTP_NOW
sleep 5
I am successful with the following output:
Client 192.168.1.108:2077 root\upgrade_info_7db780a713a4.txt, 1 Blocks Served
Client 192.168.1.108:2099 root\romfs-x.cramfs.img, 2118 Blocks Served
Client 192.168.1.108:2651 root\kernel-x.cramfs.img, 1207 Blocks Served
Client 192.168.1.108:1359 root\user-x.cramfs.img, 4496 Blocks Served
Client 192.168.1.108:1801 root\web-x.cramfs.img, 960 Blocks Served
Client 192.168.1.108:3235 root\pd-x.cramfs.img, 31 Blocks Served
Client 192.168.1.108:3307 root\custom-x.cramfs.img, 9 Blocks Served
Client 192.168.1.108:3348 root\.FLASHING_DONE_STOP_TFTP_NOW, 1 Blocks Served
Client 192.168.1.108:2217 root\success.txt, 1 Blocks Served
However, the camera does not boot, can't be pinged, and isn't accessible via telnet or ConfigTool @ port 3800.
Does anyone have any words of wisdom for me here? Is this a typical error when trying to flash a hacked Chinese cam with an English firmware? If so, does anyone know where to get the chinese firmware for this camera?