Category Archives: Insta360 ONE X2

ScrewX2 and the Insta360 WiFi security hole.

See also: my previous article.

Over on REDDIT, the subject of the gaping Insta360 WiFi security hole has come up again. User K1N6P1X3l linked to this recent article that summarizes the issue’s history:

Of course, the majority of users simply will not care. “It’s very unlikely to happen to me,” they say. “And if it does, so what, they get my photos.”

In other words, this is just like any other security issue out there. Some folks treat them seriously and take steps to avoid the problems, and others just don’t care. If it were not for the “don’t care” crowd, we wouldn’t have such great malware, viruses and ransomware :)

The exploit allows anyone within WiFi range the ability to connect to your camera and do “stuff.” According to the PetaPixel article, Insta360 has already plugged some of this:

Currently the list_directory has already been terminated and it is no longer possible to access the camera content through the browser.

– Insta360 response, per PetaPixel article

Unfortunately, this is not true. Using the current available firmware, v1.0.59_build1, on my ONE X2 I see it appear on WiFi as expected:

…and if I select this interface, and then open the URL in a browser, I find all my files are indeed able to be listed:

I can then click on one of the .insv video files and play it (or save off a copy):

“And it’s just that easy!”

With this camera, there is no privacy because the camera is broadcasting itself to any WiFi devices around it, and allowing any of them to connect without authentication and then browse and view/download anything on the microSD card.

What’s worse is you can also telnet in to the device. I tried that to see if it still worked:

You will notice it did not ask for a password here, either.

Both of these screenshots (web browser and telnet) were done on my iPad.

WHILE I was connected to my X2 via the iPad, I then connected a Windows PC. Using the default password of “88888888” I was now connected from two devices (which for some reason folks think isn’t possible). Both my Windows PC and my iPad were connected and able to access the files from a web browser.

At least two firmware updates have come out since this first appeared on REDDIT, and it does not appear anything has changed.

ScrewX2: The proof-of-concept that a script kiddie could have written

Shortly after this exploit was first mentioned, someone could have easily created a script that would look for WiFi hotspots following the name “ONE X2 xxxxx” and connect to them. The script could then issue http GET commands to retrieve files on the memory card, or telnet in to delete things, potentially bricking the camera.

Worse, the script could deliver a payload of malware, and if the user ever mounted that memory card in a computer, the malware could have been ran accidentally. Hopefully most of us will never run some random executable or installer found on a camera memory card, but it would be tempting to try to find out what “360VIEWER.EXE” does, or “Insta360MacConverter.dmg” is.

I will not link to any such “screwx2” script, and will delete any links to such posted in the comments here. The cat is firmly out of the bag, with the default WiFi password known, and NO password on the web interface or telnet, so all we can do is hope that Insta360 addresses this issue eventually.

To be continued…

Insta360 ONE X2 .insv file format


  • 2022-06-09 – Added link to ExifTool source code that parses these sections. ExifTool command line example. Updated output of parser showing the MakerNotes fields. Adding crappy brute force C test code. Added hex dump screen shots of the sections.


I am posting this now in case it helps someone else who is trying to figure this out. My goal is to be able to modify a video recorded in Bullet Time mode to appear as a normal 360 video file. I just need to figure out what bytes to zap in the file…

Over in the Insta360 REDDIT forum, user SalsaGreen pointed me to this Github repository:

It contains a Python script that parses the .insv files to export accelerometer and exposure data. This gave me a good starting point for exploring the .insv file format.

From there, searches led me to the ExifTool by Phil Harvey, which has support for parsing .insv files. Here is the parsing code:

Magic Phrase

The last 32-bytes of the file will be this special string of characters:

.insv file contents.

If those characters exist, parsing can begin.

The end of the file looks like this, with offsets being bytes from the end of the file:

Offset   Length   Description
------   ------   -----------
-78      42?      Trailer
-36      4?       ?
-32      32       Magic phrase '8db42d694ccc418790edff439fe026bf'
 0       0        End of File


The trailer is a series of (up to seven?) entries containing a 2-byte ID followed by a 4-byte offset. I am unsure if the entries are fixed, or if they can be terminated by 0x0000 / 0x00000000 entries if not all segments appear.

.insv file contents.

Segments defined in the Github Python script include:

  • 0x0101 – “.insv maker notes” (serial number, firmware version, etc.)
  • 0x0300 – accelerometer data
  • 0x0400 – exposure data
  • 0x0600 – timestamps
  • 0x0700 – GPS data
  • …and may also have 0x0900 and 0x0a00 (in comments, no code).

This makes the end of the file look like this:

Offset   Length   Description
------   ------   -----------
-78      2        Trailer entry #1 - ID
-76      4        Trailer entry #1 - Size
-72      2        Trailer entry #2 - ID
-70      4        Trailer entry #2 - Size
-66      2        Trailer entry #3 - ID
-64      4        Trailer entry #3 - Size
-60      2        Trailer entry #4 - ID
-58      4        Trailer entry #4 - Size
-54      2        Trailer entry #5 - ID
-52      4        Trailer entry #5 - Size
-48      2        Trailer entry #6 - ID
-46      4        Trailer entry #6 - Size
-44      2        Trailer entry #7 - ID
-40      4        Trailer entry #7 - Size
-36      4?       ?
-32      32       Magic phrase '8db42d694ccc418790edff439fe026bf'
 0       0        End of File

Parsing begins at offset -78 by reading the 2-byte ID and 4-byte Size. The data for that ID will be located Size bytes earlier in the file. Data parsers for each segment seek there and begin parsing.


I have now found that ExifTool can be used to display these items. It does not show the Trailer information by default, but here is a command that displays it in .json format:

exiftool -ee -G -s -b -j -a -T filename.insv

Maker Notes – ID 0x0101

WORK-IN-PROGRESS: The “maker notes” section appears to use a byte for the type of data, then a byte for the length of that data segment. Some of the bytes appear to be (QuickTime::INSV_MakerNotes)

Hex    Dec   Description
---    ---   -----------
0x0A   10    Serial Number ("IXSE42xxxxxxxx")
0x12   18    Camera Model ("Insta260 ONE X2")
0x1A   26    Firmware Version ("v1.0.51_build1")
0x2A   42    ? Parameters ?

NOTE: It appears that this section (0x0101) may be hard-coded to only have four entries, and the parser just reads four entries and stops. I was expecting some kind of record size or end of record marker, but looking at the ExifTool source shows it just does a for/next loop of 0-3.

Serial Number




A simple parser I wrote in C can parse out some of these, then it gets lost at the binary data, so there is more to it than just that:

Magic Phrase: 8db42d694ccc418790edff439fe026bf
Good file.
0x0101 0x0000073a - Maker Notes
Maker Notes - offset -1928
  Type: 0x0a (10) - SerialNumber
Length: 0x0e (14)
  Data: 49 58 53 45 34 32 xx xx xx xx xx xx xx xx (edited out)
  Text: IXSE42xxxxxxxx (edited out)

  Type: 0x12 (18) - Model
Length: 0x0f (15)
  Data: 49 6e 73 74 61 33 36 30 20 4f 4e 45 20 58 32
  Text: Insta360 ONE X2

  Type: 0x1a (26) - Firmware
Length: 0x0e (14)
  Data: 76 31 2e 30 2e 35 31 5f 62 75 69 6c 64 31
  Text: v1.0.51_build12

  Type: 0x2a (42) - Parameters
Length: 0x71 (113)
  Data: 32 5f 31 34 37 33 2e 36 38 30 5f 31 35 32 32 2e
        39 39 30 5f 31 35 34 34 2e 35 36 30 5f 30 2e 30
        33 32 5f 2d 31 2e 30 39 33 5f 2d 31 37 38 2e 30
        31 30 5f 31 34 37 35 2e 34 35 30 5f 34 35 35 34
        2e 30 39 30 5f 31 35 30 33 2e 36 32 30 5f 2d 30
        2e 30 32 39 5f 2d 31 2e 32 39 37 5f 2d 30 2e 37
        36 38 5f 36 30 38 30 5f 33 30 34 30 5f 33 31 31
  Text: 2_1473.680_1522.990_1544.560_0.032_-1.093_-178.010_1475.450_4554.090_1503.620_-0.029_-1.297_-0.768_6080_3040_3113

0x0000 0x00000000 - Unknown
0x0000 0x00000000 - Unknown
0x0000 0x00000000 - Unknown
0x0000 0x00000000 - Unknown
0x0000 0x00000000 - Unknown
0x0000 0x000f16f4 - Unknown

More work to be done on this part…

Accelerometer Data – ID 0x0300


Exposure Data – ID 0x0400


Timestamps – ID 0x0600


GPS Data – ID 0x0700


To be continued…

Crappy Brute-Force C Parsing Test Code

// .insv parser test.
// 2022-06-08 0.00 allenh - Initial brute-force version.
// 2022-06-09 0.01 allenh - Code cleanup, more defines.
#include <stdio.h>
#include <stdlib.h>
#include <string.h> // for memset()
#include <stdint.h>
#include <stdbool.h>

#define FILENAME "VID_20220607_102410_00_322.insv"
//#define FILENAME "VID_20220607_104109_00_323.insv"

// Defines / Constants / Enums
#define TRAILER_OFFSET      -78
#define TRAILER_SIZE        42

#define MAGIC_PHRASE_SIZE   32
#define MAGIC_PHRASE_STRING "8db42d694ccc418790edff439fe026bf"

    HID_MAKER_NOTES     = 0x0101,
    HID_ACCELEROMETER   = 0x0300,
    HID_EXPOSURE        = 0x0400,
    HID_TIMESTAMPS      = 0x0600,
    HID_GPS             = 0x0700
} HidEnum;

    MAKER_NOTES_MODEL        = 0x12,
    MAKER_NOTES_FIRMWARE     = 0x1a,
} MakeNotesEnum;

// Prototypes
bool checkForMagicPhrase (FILE *fp);

bool parseTrailer (FILE *fp);
bool parseMakerNotes (FILE *fp, long int offset);

const char *getHidString (unsigned int hid);
const char *getMakerNotesString (unsigned int id);

uint32_t freadU32 (FILE *fp);
uint16_t freadU16 (FILE *fp);
uint8_t freadU8 (FILE *fp);
void  hexDump (void *ptr, size_t size);

// Main
int main (int argc, char **argv)

    FILE    *fp = NULL;

    fp = fopen (FILENAME, "rb");

    if (fp != NULL)
        if (checkForMagicPhrase (fp) == true)
            printf ("Good file.\n");

            parseTrailer (fp);
        perror ("Unable to open");

    fclose (fp);

    return errno;

// Functions

// Check for the 32-byte magic phrase at the end of the file.
bool checkForMagicPhrase (FILE *fp)
    bool    status = false;

    if (fp != NULL)
        int retVal = 0;

        retVal = fseek (fp, MAGIC_PHRASE_OFFSET, SEEK_END);

        if (retVal == 0) // If successful, the function returns zero.
            size_t  bytesRead = 0;
            char    buffer[MAGIC_PHRASE_SIZE+1];

            memset (buffer, 0x0, sizeof(buffer));

            bytesRead = fread (buffer, sizeof(buffer[0]), MAGIC_PHRASE_SIZE, fp);

            if (bytesRead == MAGIC_PHRASE_SIZE)
                if (strncmp (buffer, MAGIC_PHRASE_STRING, sizeof(buffer)) == 0)
                    // Match.
                    printf ("Magic Phrase: %s\n", buffer);

                    status = true;

    return status;

// Parse Trailer.
bool parseTrailer (FILE *fp)
    bool    status = false;

    if (fp != NULL)
        int retVal = 0;
        long int offset = 0;

        offset = TRAILER_OFFSET;

        while (offset < TRAILER_OFFSET+TRAILER_SIZE)
            retVal = fseek (fp, offset, SEEK_END);

            if (retVal == 0)
                uint16_t hid = 0;
                uint32_t size = 0;

                hid = freadU16 (fp);
                size = freadU32 (fp);

                printf ("0x%04x 0x%08x - %s\n", hid, size, getHidString (hid));

                switch (hid)
                    case HID_MAKER_NOTES:
                        parseMakerNotes (fp, offset-size);

                offset = offset + sizeof(uint16_t) + sizeof(uint32_t);

    return status;

// Parse INSV_MakerNotes section.
bool parseMakerNotes (FILE *fp, long int offset)
    bool status = false;
    uint8_t type = 0;
    uint8_t length = 0;
    size_t bytesRead = 0;
    uint8_t buffer[255];

    printf ("-------------------------------------------------------------------------------\n");
    printf ("Maker Notes - offset %ld\n", offset);
    printf ("-------------------------------------------------------------------------------\n");

    // There can be only four?
    for (int entryNumber=0; entryNumber < 4; entryNumber++)
        if (offset >= TRAILER_OFFSET) // Hack.

        fseek (fp, offset, SEEK_END);

        type = freadU8 (fp);
        length = freadU8 (fp);

        printf ("  Type: 0x%02x (%u) - %s\n", type, type, getMakerNotesString (type));
        printf ("Length: 0x%02x (%u)\n", length, length);

        bytesRead = fread (buffer, sizeof(uint8_t), length, fp);
        if (bytesRead == length)
            printf ("  Data: ");
            hexDump (buffer, length);

            printf ("  Text: %s\n", buffer);

        offset = offset + length + sizeof(uint8_t) + sizeof(uint8_t);

        printf ("\n");

    return status;

// Return pointer to string for Hid.
const char *getHidString (unsigned int hid)
    const char *ptr = "Unknown";

    switch (hid)
        ptr = "Maker Notes";

        ptr = "Accelerometer";

    case HID_EXPOSURE:
        ptr = "Exposure";

        ptr = "Timestamps";

    case HID_GPS:
        ptr = "GPS";

    return ptr;

// Return pointer to string for MakerNotes ID.
const char *getMakerNotesString (unsigned int id)
    const char *ptr = "Unknown";

    switch (id)
            ptr = "SerialNumber";

        case MAKER_NOTES_MODEL:
            ptr = "Model";

            ptr = "Firmware";

            ptr = "Parameters";

    return ptr;

// Read U32, convert and return.
uint32_t freadU32 (FILE *fp)
    uint32_t val = 0;
    uint8_t a,b,c,d;

    a = freadU8 (fp);
    b = freadU8 (fp);
    c = freadU8 (fp);
    d = freadU8 (fp);

    val = (a) | (b << 8) | (c << 16) | (d << 24);

    return val;

// Read U16, convert and return.
uint16_t freadU16 (FILE *fp)
    uint16_t val = 0;
    uint8_t msb = 0;
    uint8_t lsb = 0;

    msb = freadU8 (fp);
    lsb = freadU8 (fp);

    val = (msb << 8) | (lsb);

    return val;

// Read U8.
uint8_t freadU8 (FILE *fp)
    uint8_t val = 0;

    val = fgetc (fp);

    return val;

// Dump bytes as HEX, with a tab at the start of lines after the first.
void     hexDump (void *ptr, size_t size)
    int col = 1;
    if (ptr != NULL)
        for (int idx=0; idx<size; idx++)
            printf ("%02x ", ((uint8_t*)ptr)[idx]);

            if ((col % 16) == 0)
                printf ("\n\t");
                col = 0;

        printf ("\n");

// End of main.c

Looking for Insta360 .insp and .insv file formats.

I am posting this in case someone else is doing the same searches I am.

I am trying to find details on the Insta360 ONE X2 file formats for photos (.insp) and videos (.insv). They contain meta-data I’d like to be able and parse to determine what kind of files they are. Going by filename is not enough.Th

This came up again today when someone contacted me with a ONE X2 video that was recorded in Bullet Time mode. It was not meant to be, but because the file is saved that way, the Insta360 Studio program will not allow reframing/editing the video.

Insta360 support (via app chat) has an auto responder if you ask about changing Bullet Time files to normal videos, so they have a way to do it — if you send them the files.

In the case of Bullet Time, is is recorded at 100 fps in 3K mode. It stores both lens videos in the same file. This is the same format used when recording normal 360 video at 3K / 100 fps. It appears only the meta-data is making the file appear one way or the other.

To be continued…

Insta360 ONE X2 firmware bug list


  • 2022-09-25 – open WiFi.

If you have found any bugs, please leave a comment with the version and details and I will add them to this list. As workarounds are discovered, I will update this list.

As a new version of firmware is released, these bugs will be re-tested. When they work for some, and not for others, a note will be added to that effect.


2022-04-26 – v1.0.51

  • Open WiFi – a poorly implemented WiFi system has the camera broadcast itself as a WiFi hotspot to anyone within range, and allows users that know the default WiFi password all X2 cameras have to access and download any files on the memory card from a web browser… or worse. (Suggested by commenter, yt)
  • Screen Auto Sleep – 5s timeout regardless of settings. Sometimes “1min” and “Never” appear to work, but screen keeps reverting back to around 5s before going black. (Originally reported in 1.0.41_build1)
  • USB-c connection to iPad Pro unstable. Currently is not allowing files to be downloaded. Tested with an iPad Pro (11-inch) (3rd generation). (Reported in 1.0.51)

GPS Smart Remote

  • “Camera’s remaining battery” always shows empty, regardless of charge level of camera. Battery indicator for GPS Smart Remote seems to be working.

Insta360 ONE X2 photo and video modes and filenames



This is a work-in-progress document with much more to be added. There are probably mistakes in it, currently. Please comment with any corrections you may have.


  • Table showing all the various photo and image combinations (HDR, fps settings, PRO/BASIC, etc.)
  • Example files to download.
  • Conversion tips for .insp to jpeg and PRO to video files.
  • .insprj project file info (from Insta360 Studio desktop app)
  • …and more…

The Insta360 ONE X2 camera can take photos and videos in a variety of formats:

X2 Photo Formats (Standard, HDR, Burst, Interval or Night Shot)

  • 360 (using both lenses)
  • Panorama (using one lens)
  • 150-degree (using one lens)
360Night Shotx

Google Sheet:

X2 Video Formats (Standard, HDR, Timelapse, TimeShift and Bullet Time)

  • 360 (using both lenses) – 5.7K (30, 25 of 24 fps), 4K (30 or 50 fps), and 3K (100 fps)
  • 150-degree (using one lens) – Vertical (portrait) or Horizontal (landscape)
    • BASIC: 1440P (30 or 50 fps) and 1080P (30 or 50 fps)
    • PRO: 1440P (30 or 50 fps) and 1080P (30, 50 or 120 fps).
  • NOTE: Not all qualities/fps are available in all modes.

Files are saved as .mp4 video files (150-degree videos, BASIC mode), .insv files (PRO or 360 videos), and .insp (photos).

360Bullet Time3Kx
150 BASICStandard1440Pxx
150 BASICHDR1440Pxx
150 BASICTimelapse1440Px
150 BASICTimeShift1440Px
150 BASICStandard1080Pxx
150 BASICHDR1080Pxx
150 PROStandard1440Pxx
150 PROStandard1080Pxxx

Google Sheet:

Filename Format:

  • PRE_yyyymmdd_hhmmss_xx_nnn.EXT
    • yyyy = four-digit year (2022)
    • mm = two-digit month (01-12)
    • dd = two-digit day (01-31)
    • hh = two-digit 24-hour (00-23)
    • mm = two-digit minute (00-59)
    • ss = two-digit second (00-59)
    • xx = camera
      • 00 – back camera (.dng, .insp, .insv, VID .mp4) or both cameras (.dng and .insp)
      • 01 – back camera (LRV .mp4)
      • 10 – front camera (.dng, .isnp, .insv, VID .mp4)
      • 11 – front camera (LRV .mp4)
    • nnn = sequence number (000-999)


  • IMG_ – photo (ending in .dng or .insp)
  • LRV_ – low-resolution preview video (ending in .mp4 or .insv)
  • PRO_LRV_ – low-resolution preview video shot in PRO mode (ending in .mp4 or .insv).
  • PRO_VID_ – video show in PRO mode (ending in .mp4 or .insv) –
  • VID_ – video (ending in .mp4 or .insv)


  • .dng = RAW photo
    • xx of 00 (back) or 01 (front) – one circular image.
      • Examples:
        IMG_20220322_223414_00_211.dng (back camera)
        IMG_20220322_223405_10_210.dng (front camera)
    • Or, xx of 00 – two circular images (front and back cameras)
      • Example:
        IMG_20220322_223429_00_212.dng (both cameras)
  • .insp = 150-degree or 360-degree photo
    • xx of 00 (back) or 10 (front) – 150-degree image (single camera)
      • Example:
        IMG_20220322_223414_00_211.insp (back camera)
        IMG_20220322_223405_10_210.insp (front camera)
    • Or, xx of 00 – 360 image (both cameras)
      • Examples:
        IMG_20220322_223429_00_212.insp (front and back cameras)
    • HDR images will have three files with the same yyyymmdd_hhmmss name, xx of 00, and sequential sequence numbers.
      • Examples:
        IMG_20220211_094002_00_065.insp (back camera)
        IMG_20220211_094002_00_066.insp (back camera)
        IMG_20220211_094002_00_066.insp (back camera)
  • .insv = 360-degree video
    • LRV_ – 360 low res version of the video. xx will be 11:
      • Example:
        LRV_20220212_070353_11_003.insv (front and back cameras)
    • VID_ – 360-degree full size video. Two files with same yyyymmdd_hhmmss name and xx of 00 for back camera video and 10 for front camera video.
      • Examples:
        VID_20220212_070353_00_003.insv (back camera) VID_20220212_070353_10_003.insv (front camera)
  • .mp4 = 150-degree video
    • LRV_ – low res version of the video (vertical or horizontal orientation).
      • Example:
        LRV_20220212_112510_01_054.mp4 (back camera)
        LRV_20220211_153548_11_074.mp4 (front camera)
    • VID_ – full size video (vertical or horizontal orientation).
      • Example:
        VID_20220212_112510_00_054.mp4 (back camera)
        VID_20220211_153548_10_074.mp4 (front camera)

The filename and extension alone cannot be used to determine the type of file. Here is a table of the possible combinations:

Insta360 X2 Filenames

.dngxback / bothfront
.inspxback / bothfront
.insvxxbackfrontLRV both
.mp4xxxxbackbackfrontLRV front

Google Sheet:

You can see that .dng raw files and .insp image files use the same “00” code for single back lens images and 360 images that use both lenses. Insta360 has suggested using the file size to know if the image contains just one back lens image or both lens images.

360 Image File Examples (.insv)

NOTE: You can preview a .insv file by adding the extension “.mp4” to the end. In this example, I took all my .insv files and renamed them to “filename.insv.mp4” (so I could preserve the original extension in the filename). That allowed me to preview them in GraphicsConverter on the Mac.

You will see there should be an “LRV_yyyymmdd_hhmmss_xx_nnn.insv” file which is a low res preview movie containing both the front and back camera, then two “VID_” files with the same date/time and number, with one having 00 for the back camera and the other having 10 for the front camera:

Insat360 360-Degree .insv video (LRV low-res both cameras, VID back and front cameras).

The LRV_ files are only used by the Insta360 Studio program.

Timelapse 360 Example (.insv)

However, a time-lapse .insv recording will not have a LRV_ version. Here are two .insv time-lapse files for the same recording. 00 for the back camera, and 10 for the front camera:

Insta360 360-Degree .insv video (VID back and front camera).

150-degree Example (.mp4)

The camera will save two files: a low resolution LRV_ file with 01 if it used the back camera or 11 if it used the front, and a full size VID_ file with 00 for the back camera or 10 for the front:

Insta360 150-Degree .mp4 Timelapse video (LRV low-res, and VID full size).

360 Image Example (.insp)

The camera will record one .insp file which contains both the front and back camera images.

Insta360 360-Degree .insp photo.

150-Degree Image Example (.insp)

The camera will record one .insp file which contains either the front camera image (10) or back camera image (00):

Insta360 150-Degree .insp photo.

…More to come…

Insta360 ONE X2: default WiFi password and telnet root access?


  • 2022-1-28 – Additional details.
  • 2022-1-31 – Added link to YouTube video discussion.

Over on REDDIT I found a troubling post about the 360 camera I am currently reviewing:

Doing a bit of searching led me to more information elsewhere in a forum post from 3/6/2021:

How can a popular consumer product have a hard-coded WiFi password that gives access to all your photos and videos? Even worse, how can it have a non-encrypted telnet server (which even Windows and macOS have removed) that lets one log in as the root user without needing a password?

Since this information has been public for at least almost a year, and the problem remains in the most recent firmware update (dated 1/22/2022 as of this writing), either Insta360 is unaware of the problem or doesn’t think it is a problem.

Either way, I think I’m going to change the root password on mine, and a REDDIT reply says you can change the WiFi password if you don’t mind manually connecting WiFi to the camera each time.

Baby steps.

Until next time…

Additional Details

WiFi password is reportedly generated by Bluetooth, and ends up in a temporary file created each time:


The script that generates this file is in /usr/local/share/script/

There, I see places where AP_PASSWD is set, overwriting a default of 1234567890 listed in wifi.conf/wifi.ap.conf. may be the one (AP = access point).

I will share details on if there is any easy way to alter the password from the default, assuming the Insta360 app allows that. My thought is generating a new file on startup and making it read-only so the app cannot overwrite it.

Shared Security Show on YouTube

Discussed at the 14:40 mark.

The many, many Insta360 Selfie Sticks


  • 1/18/2022 – Page created.
  • 2/17/2022 – Added some Bullet Time Bundle details.
  • 4/26/2022 – Added the new Power Selfie Stick.

Why are there so many? What are the differences? Let’s find out…

The first problem is that the official online store does not currently give any specifications of these accessories. Only two mention a length in their product name. You can find their full accessory list here:

The following table will contain information as I obtain it.


Collapsed LengthExtended LengthWeightBuilt-In Tripod?PriceNotes
2-in-1 Invisible Selfie Stick + Tripod24 cm / 9.4 in105 cm / 41.3 cmYes$25
70cm Invisible Selfie Stick15 cm / 6 in70 cm / 27.5 in$19.99
120cm Invisible Selfie Stick23.5 cm / 9.25 in120 cm / 47.4 in$16
All-Purpose TripodYes$34.90
Bullet Time Accessory (2022 bundle)120 cm / 47.2 inIncludes Handle (Tripod)$55
Bullet Time Handle (Tripod)16.9 cm / 6.6 inN/AYes$40
Extended Edition Selfie Stick (new version)36 cm / 14 in3 m / 9.8 ft$99.99
Extended Edition Selfie Stick (old version)55.8 cm / 22 in304.8 cm / 10 ft
Power Selfie Stick33 cm / 13 in100 cm / 39.3 in$69.994500 mAh battery and power/shutter buttons. Cannot get wet.

120cm Invisible Selfie Stick

  • Possibly the one included with the special Apple Store X2 kit.

2-in-1 Invisible Selfie Stick + Tripod

  • Larger selfie stick (in thickness) with a fold-out tripod at the end of the handle.

70cm Invisible Selfie Stick

  • Possibly the stick being included with the Bullet Time accessory.

All-Purpose Tripod

  • A tiny tripod base that the selfie sticks can screw in to.

Bullet Time Accessory

  • Includes a special tripod base with a spinning top. The top can be locked so it will not spin. A selfie stick can be attached at the top to use this as a tripod, or on the side, to use a bullet time accessory. (Kit shipping in 2022 includes a 120cm selfie stick, but the packaging had a spot that was designed to hold a taller collapsed stick — no details on what that one was.)

Extended Edition Selfie Stick (new)

  • No details yet.

Extended Edition Selfie Stick (old)

  • No details yet.

Power Selfie Stick

  • Contains a 4500 mAh battery to double the shooting time of the camera. (The battery included with the X2, for example, is about 1600 mAh).
  • Contains buttons to start/stop the camera so you can use it like a remote control.
  • 100 cm extending length. (This makes it a selfie stick with the battery, different than things like the LUME power handle, which is just a handle with a battery).