🔎 Extract firmware, recover keys, and execute code. This is what hostile actors can achieve with physical access to devices with hardware security deficiencies. @antoniovazquezblanco outlines the key steps in a security analysis of two devices.
https://www.tarlogic.com/blog/reverse-engineering-dahua-nvr-xvr-devices/
https://www.tarlogic.com/blog/reverse-engineering-dahua-nvr-xvr-devices/