Telnet and Root on the Sercomm iCamera2
tldr;
- URL
http://[IP]/adm/file.cgi?todo=inject_telnetd
- Telnet username
root
- Telnet password
Aq0+0009
History
Four years ago to the day, I wrote an exposé of the hideous security failings of Sercomm IP Cameras. The blog has since attracted 200 comments - as people try to unlock their cameras, and find out what flaws they have.
Despite my best efforts at contacting Sercomm - the OEM who manufactures the cameras - and the "security" resellers who irresponsibly sell them to unsuspecting customers, the flaws remain unpatched.
Factory Reset
Most of the Sercomm cameras have a custom firmware which locks them down. As documented in my previous blog post, resetting the cameras is depressingly easy.
- Stick paperclip in the reset hole for a few seconds.
- The default login name is
administrator
- There is no password set!
Turning on Telnet
The process for enabling Telnet was first published in 2011. It depends on the firmware that Sercomm have pre-loaded, but you just need to visit the specially crafted URl: http://[IP]/adm/file.cgi?todo=inject_telnetd

Firmware Trickery
Over on my GitHub repo of Sercomm API commands, you'll find a copy of the firmware for the iCamera 1000.
A contributor to the blog, Paul Chambers, describes how he deciphered the firmware.
The firmware is a modified SquashFS filesystem. Inside, it contains a symlink from
/etc/passwd -> /mnt/ramdisk/tmp/passwd
/etc/rc.sethost
contains the stringpasswd
Running rc.sethost does various things including writing a passwd file to/mnt/ramdisk/tmp/passwd
Inside that, I sawroot:9sXicXdz8JrVk:0:0:root:/root:/bin/sh
The string9sXicXdz8JrVk
is a traditional DES based hash I patchedrc.sethost
to skip the call tocrypt
. Then I got:root:Aq0+0009:0:0:root:/root:/bin/sh
I double-checked it was correct by runningsquashfs-root$python -c "import crypt;print crypt.crypt('Aq0+0009', '9s')"
9sXicXdz8JrVk
So the username isroot
and the password isAq0+0009
There you have it. Different cameras may have different firmwares with different passwords - but I'd guess that they all follow a similar pattern. This particular password works on Firmware version V3.0.01.29
Enjoy!
Dennis A Vitali says:
ArcAiN6 says:
Krytos says:
Marken says:
Robert Monsen says:
akzorz says:
Richard Amiss says:
Jaye diggs says:
prince noor says:
Aseem Patnaik says:
Akzorz says:
Akzorz says:
Mayank says:
Rick McLeod says:
Ian says:
@edent says:
Jason anderson says:
@edent says:
Romans says:
Hi, is there any posibility to decode: admin_name=administrator admin_password=a679f2fec62be3f8f23cf731cfdbb596:
this is from config file
@edent says:
This is a very old post about extremely old cameras. You are unlikely to get a reply. It might help if you said the make, model, and firmware version of your device.
Romans says:
I dumped the FW of Sercomm (ADT) DBC835 Doorbell I think there only one FW exists, the internals are really interesting, it has even OpenVPN that's run on it and ton of apps. but they changed default administrator blank pass now it want's the password, shadow sends to null and didn't find any other place except config file that has it in AES.
sfm153 says:
sfm153 says:
@edent says: