upx packed binaries. - pingumacpenguin/FH86XX_Cameras GitHub Wiki
A number (all?) of the binaries are upx packed, presumably to save flash space.
This means that simply running "strings" over these binaries is not going to be effective, however unpacking the binary first is, so...
Get root on your device.
tar the contents of the filesystem to the sd card. Yes, the busybox on the device has tar.
Take the sd card to your pc, and untar the contents to a folder.
Obtain the latest version of upx from https://github.com/upx/upx/releases
Install it
Select a suitable binary to attack
Unpack that binary
Check the unpacked binary for interesting strings.
For example I now know the camera firmware is aware of the following chip IDs.
ut_get_chip_id
FH8830
FH8630
FH8630D
FH8630M
FH8632
FH8632V2
FH8856
FH8852
FH8626V100
FH8616
FH8852V200
FH8856V200
FH8858V200
FH8852V210
FH8856V210
FH8858V210
FH8852V2X0
FH8856V2X0
FH8858V2X0
FH8652
FH8656
FH8658
FH8852V201
FH8852V202
FH8636
FH8626V200
FH8898
FH8896
FH8210
FH8862
FH8858V300
FH8856V300
FH8858V310
FH8856V310
FH8852V310
FH8810