Aqara Video Doorbell G410
From Wiki-IoT
Revision as of 20:41, 5 October 2025 by Jeandecian (talk | contribs)
Classification
| Aqara Video Doorbell G410 | |
|---|---|
| Classification | |
| Grade | A |
| Calculator version | 1 |
| Classification date | 2025-10-05 |
| Information | |
| Name | Aqara Doorbell Camera Hub G410 |
| Brand by Parent | Aqara by Lumi United / Aqara (Aqara brand) |
| Generation | 1th |
| Model(s) | CH-C09D / CH-C09E |
| Release date | 2025-01-06 |
| Type/Category | Smart video doorbell / Doorbell + hub (gateway) |
| Website | [1] |
| Status | In sale |
| More | |
| Dimensions | 141.5 × 65 × 30.4 mm; Chime/Hub: 65.2 × 65 × 28.4 mm |
| Mass | not publicly specified |
| Operating system | Embedded firmware |
| Companion App | Aqara Home App |
| CPU | not disclosed |
| GPU | not disclosed |
| Memory | not disclosed |
| Storage | microSD card, up to 512 GB |
| Battery | 6 × LR6 AA alkaline batteries |
| Power | 12-24 V AC @ 0.2 A or 12-24 V DC @ 0.5 A (main unit); chime/hub: 5 V DC @ 1 A (USB-C) |
| Charging | no built-in rechargeable battery / battery is replaceable |
| Display | no display |
| Camera | 2K resolution, 175° diagonal field of view, 4:3 aspect ratio |
| Sound | two-way audio, chime hub with speaker up to 95 dB |
| Connectivity | Wi-Fi (2.4 / 5 GHz, 802.11 b/g/n/a/ac), Zigbee, Thread (IEEE 802.15.4), Bluetooth |
| Device | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Known hardware tampering | Rare | [] | There is no public evidence showing widespread hardware tampering cases. |
| Known vulnerabilities | Rare | [2] | |
| Prior attacks | None | [] | No confirmed public records of known security attacks have been found. |
| Updatability | Very common | [3] | |
| Category score | 2 | ||
| System | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Authentication with other systems | Full | [4] | |
| Communications | Encrypted with up-to-date encryption | [5] | |
| Storage | Encrypted with up-to-date encryption | [6] | |
| Category score | 1 | ||
| User Authentication | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Account management | Full | [7] | |
| Authentication | Secure | [8] | |
| Brute-force protection | Exist | [9] | Not specifically documented, but standard OAuth/ account systems include protections |
| Event logging | Access event logged | [10] | Aqara account / server side would log token issuance, device commands |
| Passwords | Require change after setup with complexity requirements | [11] | |
| Category score | 1 | ||
| Grade | A |
|---|