u/Big_Diamond_3026

Body: Hi everyone,

I’m trying to install OpenIPC (or just a clean, custom Linux) on my Hikvision DS-2CD1043G0-IUF camera. I just dumped the full 16MB SPI flash using a CH341A programmer, but I'm stuck at the secure boot stage.

Hardware Specs:

  • SoC: Fullhan FH8852V200 (CPU: CK810 / C-SKY architecture)
  • Flash: 16MB SPI NOR (XMC XM25QH128C)
  • RAM: 128MB

The Problem: The stock HKVS U-Boot is heavily locked down. It verifies Hikvision's proprietary mImage format (AES decryption + SHA + RSA signature check) via the <sbal_seboot> function. Unsigned images are immediately rejected, so I cannot boot the OpenIPC kernel. On top of that, standard memory/flash commands (sf, mw.b, tftpboot) are stripped from U-Boot.

The Goal: I need someone with reverse engineering experience to look at my dump and either:

  1. Patch the U-Boot (mtd0) to bypass the signature check so it accepts unsigned kernels.
  2. Find the AES keys (likely in mtd2) to decrypt the file system / packing format.
  3. Help compile an unlocked, open-source U-Boot for this specific FH8852V200 (CK810) board.

Here is the full 16MB Flash Dump: https://fromsmash.com/0iuQFxHacY-dt

Any help, patches, or pointers would be greatly appreciated. Thanks in advance!

u/Big_Diamond_3026 — 8 days ago