Jump to content
Explore Forums
  • Recently Browsing   0 members

    No registered users viewing this page.


Wyze Camera V2 installing custom firmware

Recommended Posts

In another thread Wyze cameras came up:

Generated a lot of interest, cheap HD camera...small...  I picked up a pair of V2 cameras for about $50 and did some playing around.

Wyze camera

From what I've been able to find out these are rebranded/slightly modified Xiaomi Mi home security camera aimed as the U.S. and European markets.  Instead of being tied to the Xiaomi Mi service, it's tied to Wyze.

Sadly they are not ONVIF compliant.

Wyze App

First thing I did was mess around with the official way to use these cameras.  From what I was able to gather info wise, the 'cloud' component is so the app can find your cameras and allows your camera to push recordings to their server

As this is unknown software/hardware, my plan was to put them on my guest network.  My guest network is unsecured with a captive portal, for this I was on my WIFI controller so I could authorize the cameras as there would be no way to put in the captive portal password. First thing I discovered was that the app cannot connect to unsecured WIFI, maybe they think that's a good thing for most people... probably is.  So I setup a new guest network that does have a password just to get past this hurdle.

Installation was pretty easy.  You put the camera into config mode, type in WIFI SSID and password on the app, it displays a QR code which is read by the Wyze camera.  That all worked as it should.

The camera image was very noticeably delayed on the APP.  It's very likely that the images are being pushed to their cloud service first and then down to the app.  Besides the latency, this means that if anyone involved (Amazon where the servers are, Wyze, etc) doesn't secure things properly anyone can look at your cameras.  IMO that is unacceptable.

OpenIPC firmware

OpenIPC is a fork of Xiaomi-Dafang, I think the idea was to make it more user friendly and perhaps add more features.. as least that's the claim.   The real goal seems to be to monetize open source code, the OpenIPC website really tries to sell you an 8GB SDHC card that just has the hack copied to it... nothing special that I could find.  Maybe they will deliver on features/usability in the future.. no clue on that.

They also seem to be lagging, failing to merge from the source repository on a regular basis.  I was able to install the firmware, however the imager in the latest hardware appears to be un-supported..  I didn't dig in further, I found recent posts reporting the same problem and nobody from OpenIPC offering any solutions/workaround or a timeline for a fix. 

Xiaomi-Dafang (link to github repository)

Other than the instructions being one too many steps (you can copy the hacked binary to the root of the SDHC card, AND copy the CFW firmware as well.. no need to install the binary then install CFW).  This worked well..

At this time max resolution is 1600x900 using hacked firmware, anything higher results in no image.  Getting the feed from RTSP was easy, works well.. direct access is of course much less laggy. 

I've attached the Xiaomi-DaWyze V2_Xiaomi-Dafang_Firmware.zipfang firmware, with Wyze V2 binary already in place.  You should be able to unzip that to root of a FAT32 formatted micro-SD card, update the config\wpa_supplicant.conf file with your WIFI settings.  Install, power up cam with setup button held until LED near power connection lights solid blue.. let go of the setup button and wait.  When light turns orange, you should be connected to your wifi and ready to go: https:\\dafang should get you to the camera. 

I'm still poking about in the config, playing with settings and the like.  For the prices seems to be a pretty good camera.



If you require remote access and are not willing/able to setup/manage the necessary infrastructure yourself (I used SSH tunneling).  And the risk of your camera feed becoming public isn't high on your list of concerns.  Give the Wyze app a try.  Otherwise I'd recommend the Xiaomi-Dafang hack as the best option at this time.



Share this post

Link to post
Share on other sites

Thanks Brenden, the privacy issues is my main concern, so right now the only camera that I will leave plugged in is the garage cam, and I will hook the others up inside when we leave to go to different places for work. 

Share this post

Link to post
Share on other sites

Thanks much Brenden, I’ll have my son look at this thread and hook me up too. (I’m too stupid on this computer electronic crap) 

Share this post

Link to post
Share on other sites

Now that I've had a chance to poke around some with the hack firmware.

For surveillance purpose typically 5-10fps is sufficient.  I'm testing cameras set to 1600x900, 10fps, 2000 bitrate and CBR.  Seems like reasonable settings.

the motion detection seems to work okay, however the feature to send mail when motion is detected appears to have some bugs.   I can see it connecting to my mail server, then just dropping pretty much immediately.  There is a feature to FTP upload images from motion detection, you have to modify motion.conf to enable that.  I'm going to try that, and setup my FTP server to email alerts when new images are received.  That should work just as well as the camera sending directly.


Share this post

Link to post
Share on other sites

If you want to use FTP upload of motion detection, you'll need to add a variable to motion.conf


It's in seconds, without that it'll record 0 second videos and upload them... not too handy.  I reported that to the person who implemented the feature so it should end be fixed in the repo sometime.

Share this post

Link to post
Share on other sites
On 3/11/2019 at 10:47 AM, Bob said:

Thanks Brenden, the privacy issues is my main concern, so right now the only camera that I will leave plugged in is the garage cam, and I will hook the others up inside when we leave to go to different places for work. 

I received my SimpliSafe stuff the other day including a camera. It has a "privacy shutter" which opens when the system is armed. The system is going into my business so haven't set it up just yet.

Share this post

Link to post
Share on other sites

Another bug I found, if you set a region for motion detection it somehow causes the RTSP server to crash after server 3 or so frames.  Removing the region, and it works.  I might look into this and submit a fix if I have time.

Share this post

Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Who's Online   1 Member, 0 Anonymous, 7 Guests (See full list)

  • Our picks

    • This is the location of the famous Mojave Phone Booth. Unfortunately not much is left today, but it's still a cool location to visit with an interesting history. 
      • 1 reply
    • South Pass City WY
      South Pass City, approximately 90 miles north of Rock Springs, is a historic site administered by the state of Wyoming.  It consists of over 30 log, frame, and stone buildings, along with the Carissa Mine and Stamp Mill.

      South Pass City Historic Site
      • 11 images
    • Surprise Canyon, California
      Recently, I’ve been going through my old VHS video tapes and digitizing them to DVDs.  These tapes contain my travels and explorations between 1995 and 2009.  I thought I’d start releasing some video shorts of my early travels on this forum.

      The back story for this particular video is as follows.  On March 30, 1996, I made a short hike of about a mile and a third up the lower third of Surprise Canyon, on the western slopes of the Panamint Range, Inyo County, California.  This canyon is just outside of Death Valley National Park.  This canyon has running water running year round through the stretch shown, fed by substantial Limekiln Springs, and the canyon is a water wonderland.  For those not familiar with the area, refer to the two maps.  The first one shows the canyon in relation to the region, the other a close up of the canyon and the ghost town of Panamint City.  The blue line in the close up image shows the route that was taken.

      • 23 replies
    • Exploration Field Trips - March 31-April 2, 2000 - Into the Nevada Triangle with Lew Shorb
      My next series of videos will be based on a trip in 2000 that I took with Lew Shorb.  Lew is a board member here, as well as owner of the popular website http://www.ghosttownexplorers.org/ghost.htm

      In breaking with my past habit of culling out historical sites and ghost towns and creating short videos dealing with these, I decided to keep the exploring part of Explore Forums in and create videos of each day of my travel and exploration, including our camps.  Scenery, travel, camping ghost towns and wide open spaces.

      Part one of this series, as well as subsequent videos, will all appear here within this same thread. Part I will start in my garage, where I was finishing up with the packing my truck.  The following day, after work, I begin my travels to meet Lew Shorb at Rhyolite, Nevada ghost town.

      Our three day, two night travels prowled about the "Nevada Triangle" section of northeastern Death Valley National Park; and will include such sites as:

      1. The Las Vegas & Tonopah Railroad
      2. Gold Bar
      3. Phinney Mine
      4. Strozzi Ranch
      5. Currie Well (LV&T RR)
      6. Mud Springs Summit (LV&T RR)
      7. Happy Hooligan Mine

      This video, that of March 30th and 31st, will start off this series; and is brief, only being 3:28 long.  Nevada-Triangle_Shorb-2000_Part-1.wmv

      So, below is my narrative of part one of this series to give full context of what is seen in the video.  It will probably take longer to read than the video is long.


      • 9 replies
    • Exploration Field Trips: May 1-3, 2000 - Trip with Alan Patera and Alan Hensher into Death Valley
      Exploration Field Trips:
      May 1-3, 2000
      Trip with Alan Patera and Alan Hensher into Death Valley

      What do you do with three authors, two 4x4’s, two two-way radios, three cameras, and camping supplies? Send them to Death Valley, of course. For three days in the first week of May, 2000, fellow authors and historical researchers Alan Patera, Alan Hensher and myself explored Death Valley north and south.

      Alan Patera writes and publishes the WESTERN PLACES series of monograph books.  Alan Hensher has been published in several periodicals as well as authoring several books, centering primarily on the history of Mojave Desert sites.

      Alan Patera, who hails from Oregon, came south to California and picked up Alan Hensher; then the two came my way. At the time I was living in Ridgecrest, California. After overnighting with my wife and I, the three of us took off for Death Valley.  Alan was busy researching and photographing for a future edition of WESTERN PLACES, this time centering on the camps of the Funeral Range, which forms the eastern border of east central Death Valley.  Circumstances and changes of our journey lead Alan to plant the seeds of two more future books, this time centering just outside the northernmost section of Death Valley.


      • 4 replies
  • Create New...