Changes for page Why can't the password access AT command after upgrade(-NB)?
Last modified by Mengting Qiu on 2024/08/27 18:17
Change comment:
There is no comment for this version
Summary
-
Page properties (1 modified, 0 added, 0 removed)
-
Attachments (0 modified, 2 added, 0 removed)
Details
- Page properties
-
- Content
-
... ... @@ -88,8 +88,8 @@ 88 88 89 89 **Procedure for querying the password(old firmware):** 90 90 91 -* After the firmware upgrade is complete, switch back to the FLASH and reset the node to run the newfirmware once.92 -* Then place the switch at the ISP and connect to the STM32CubeProgrammer (same as when burning the firmware). 91 +* After the firmware upgrade is complete, switch back to the **FLASH** and reset the node to **run the firmware once**. 92 +* Then place the switch at the **ISP** and connect to the STM32CubeProgrammer (same as when burning the firmware). 93 93 * Click "Device memory", enter **0x08019000** in "Address", and click "Read" 94 94 * Find the 0x08019000 address field and then read the current password as shown in the screenshot below. 95 95 ... ... @@ -100,16 +100,27 @@ 100 100 101 101 Refer to [[the old and new firmware division>>http://wiki.dragino.com/xwiki/bin/view/Why%20can%27t%20the%20password%20access%20AT%20command%20after%20upgrade%28-NB%29%3F/#H3.A0VersionConfirmation]] above, and run the firmware first after updating the firmware. 102 102 103 -* After the firmware upgrade is complete, switch back to the FLASH and reset the node to run the new firmware once. 104 -* Then place the switch at the ISP and connect to the STM32CubeProgrammer (same as when burning the firmware). 105 -* Click "Device memory", enter **0x080 19000** in "Address", and click "Read"106 -* Find the 0x080 19000address field and then read the current password as shown in the screenshot below.103 +* After the firmware upgrade is complete, switch back to the **FLASH** and reset the node to **run the new firmware once**. 104 +* Then place the switch at the **ISP** and connect to the STM32CubeProgrammer (same as when burning the firmware). 105 +* Click "Device memory", enter **0x08025D00** in "Address", and click "Read" 106 +* Find the 0x08025D00 address field and then read the current password as shown in the screenshot below. 107 107 108 108 [[image:image-20240827180414-1.png||height="527" width="910"]] 109 109 110 110 111 111 112 += 5. Special case = 112 112 113 113 115 +If the user has never changed the password manually, the user cannot find the valid password through the above two password addresses. In this case, the valid password is still the original password on the node box label (**AT+PIN**). 114 114 117 +Invalid query screenshot example: 118 + 119 +[[image:image-20240827181447-4.png||height="519" width="889"]] 120 + 121 +[[image:image-20240827181431-3.png||height="515" width="892"]] 122 + 123 + 124 + 125 + 115 115
- image-20240827181431-3.png
-
- Author
-
... ... @@ -1,0 +1,1 @@ 1 +XWiki.ting - Size
-
... ... @@ -1,0 +1,1 @@ 1 +331.6 KB - Content
- image-20240827181447-4.png
-
- Author
-
... ... @@ -1,0 +1,1 @@ 1 +XWiki.ting - Size
-
... ... @@ -1,0 +1,1 @@ 1 +302.2 KB - Content