🔎 Extract firmware, recover keys, and execute code. This is what hostile actors can achieve with physical access to devices with hardware security deficiencies. @antoniovazquezblanco outlines the key steps in a security analysis of two devices.
https://www.tarlogic.com/blog/reverse-engineering-dahua-nvr-xvr-devices/
Reverse Engineering Dahua NVR/XVR Devices and Breaking Their Boot Security

Reverse engineering of Dahua NVR-XVR devices revealed weaknesses in the implementation of security mechanisms

Tarlogic Security