-
-
Notifications
You must be signed in to change notification settings - Fork 494
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Failed to flash WIFIDS10WT #1064
Comments
==> smarthack-mqtt.log <== ==> smarthack-psk.log <== ==> smarthack-udp.log <== ==> smarthack-web.log <== ==> smarthack-wifi.log <== ==> smarthack-web.log <== GET /gw.json?a=s.gw.token.get&et=1&gwId=04876840f4cfa25ce2fb&other={"token":"00000000","region":"US","tlinkStat":{"configure":"smartconfig","time":28,"source":"ap","path":"multicast"}}&t=4&v=3.0&sign=965ffaf3317182d0b9c8391f88395db7 Answer s.gw.token.get POST /gw.json?a=s.gw.dev.pk.active&et=1&gwId=04876840f4cfa25ce2fb&other={"token":"00000000"}&t=4&v=3.0&sign=6935eb688ebaf464abf58f12b5f15faa payload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gw.json?a=tuya.device.dynamic.config.get&et=1&gwId=04876840f4cfa25ce2fb&t=5&v=1.0&sign=0ba701c933bd8e1eb031f03f60cef295 Answer tuya.device.dynamic.config.get ==> smarthack-psk.log <== ==> smarthack-web.log <== ==> smarthack-psk.log <== ==> smarthack-mqtt.log <== ==> smarthack-psk.log <== ==> smarthack-web.log <== ==> smarthack-mqtt.log <== ==> smarthack-udp.log <== |
Thanks for your detailed logs @MrMEEE It looks like this device should be supported, however it is not accepting the fake config.get API response. I've seen this come up before and at the moment, I do not know of a workaround. I can take another look soon and let you know if I find anything you can try. |
The endless loop also occurs with the Nous A1 VfR ich product, which is identical in construction to the Gosund SP111 and the BlitzWolf SHP6: SmartConfig complete. The Nous A1 immediately returns to normal mode when you try to flash. |
Before opening a new issue, please read the following
Trying to flash my Nedis WIFIDS10MT Smoke detector:
IMPORTANT
This step is IMPORTANT otherwise the smartconfig may not work!
Make sure nothing else is plugged into your IoT device while attempting to flash.
======================================================
Starting smart config pairing procedure
Waiting for the device to install the intermediate firmware
Put device in EZ config mode (blinking fast)
Sending SSID vtrust-flash
Sending wifiPassword
Sending token 00000000
Sending secret 0101
................
SmartConfig complete.
Resending SmartConfig Packets
.................
SmartConfig complete.
Resending SmartConfig Packets
..................
SmartConfig complete.
Resending SmartConfig Packets
..................
SmartConfig complete.
Auto retry in 1s. ..............................................................................
Timed out while waiting for the device to (re)connect
Attempting to diagnose the issue...
An ESP82xx based device connected according to your wifi log.
If this is the device you are trying to flash, another issue may be preventing it from flashing.
Otherwise, it could be that the device does not use an ESP82xx or it did not connect.
For additional information, check the *.log files inside the scripts folder.
Please include these logs when opening a new issue on our GitHub issue tracker.
Do you want to try flashing another device? [y/N] N
Cleaning up...
Closing AP
Exiting...
Can anyone help me out?
The text was updated successfully, but these errors were encountered: